Blog

  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

    China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

    The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage group known as Tick.
    The vulnerability, tracked as CVE-2025-61932 (CVSS score: 9.3), allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise versions of the program. JPCERT/CC, in an alert issued this month, said that it

  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth

    The MSP Cybersecurity Readiness Guide: Turning Security into Growth

    MSPs are facing rising client expectations for strong cybersecurity and compliance outcomes, while threats grow more complex and regulatory demands evolve. Meanwhile, clients are increasingly seeking comprehensive protection without taking on the burden of managing security themselves.
    This shift represents a major growth opportunity. By delivering advanced cybersecurity and compliance

  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

    CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from Australia and Canada, have released guidance to harden on-premise Microsoft Exchange Server instances from potential exploitation.
    “By restricting administrative access, implementing multi-factor authentication, enforcing strict transport security

  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

    Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

    Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were leaked within Visual Studio Code (VS Code) extensions published in the marketplace.
    The action comes following a report from cloud security company Wiz earlier this month, which found several extensions from both Microsoft’s VS Code Marketplace and Open VSX

  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

    CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild.
    The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), which could be exploited by an attacker to attain

  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

    A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

    A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests microphone and camera permissions. MacOS is supposed to flag that, but in this case, the checks are loose. The app gets access anyway.
    On another Mac in the same office, file sharing is enabled through an old protocol called SMB version one. It’s fast and

  • The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

    The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

    Security doesn’t fail at the point of breach. It fails at the point of impact. 
    That line set the tone for this year’s Picus Breach and Simulation (BAS) Summit, where researchers, practitioners, and CISOs all echoed the same theme: cyber defense is no longer about prediction. It’s about proof.
    When a new exploit drops, scanners scour the internet in minutes. Once attackers gain a foothold,

  • ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising

    ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising

    The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact targets. At the same time, defenders face growing blind spots — from spoofed messages to large-scale social engineering.
    This week’s findings show how that shrinking margin of safety is redrawing the threat landscape. Here’s what’s

  • PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs

    PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs

    Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100 malicious packages that can steal authentication tokens, CI/CD secrets, and GitHub credentials from developers’ machines.
    The campaign has been codenamed PhantomRaven by Koi Security. The activity is assessed to have begun in August 2025, when the first

  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices

    Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices

    Cybersecurity researchers are calling attention to a spike in automated attacks targeting PHP servers, IoT devices, and cloud gateways by various botnets such as Mirai, Gafgyt, and Mozi.
    “These automated campaigns exploit known CVE vulnerabilities and cloud misconfigurations to gain control over exposed systems and expand botnet networks,” the Qualys Threat Research Unit (TRU) said in a report