Tag: Cyber Security News

Threat Actors Exploit Top Domain Zones for Cyber Attacks

Threat actors are exploiting a diverse range of top-level domains (TLDs) for phishing campaigns, with the .li domain extension emerging as the most dangerous by ratio.  According to recent analysis, an unprecedented 57.22% of observed .li domains have been flagged…

Woodpecker Red Teaming Tool to Find Vulnerabilities in AI, Kubernetes & APIs

A new open-source automated red teaming engine designed to democratize advanced security testing across AI systems, Kubernetes environments, and APIs.  The tool addresses the growing complexity of security vulnerabilities as organizations increasingly adopt cloud-native applications and artificial intelligence technologies. Woodpecker…

Preventing Data Exfiltration in Advanced Persistent Threat Attacks

In today’s hyper-connected world, Advanced Persistent Threats (APTs) have become one of organizations’ most formidable challenges. These stealthy, well-resourced adversaries-often backed by nation-states or organized cybercriminal groups-don’t just seek to disrupt operations; their primary objective is often the silent theft…

CISA Publishes SIEM & SOAR Guide Exclusively for Cyber Security Practitioners

CISA released comprehensive guidance documents on May 27, 2025, specifically designed to assist cybersecurity practitioners in implementing Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms.  Developed in collaboration with the Australian Signals Directorate’s Australian…

APT Exploitation of Supply Chain Vulnerabilities in Enterprises

In 2025, the exploitation of supply chain vulnerabilities by Advanced Persistent Threats (APTs) has emerged as one of the most significant and damaging trends in enterprise cybersecurity. As organizations become increasingly interconnected, the supply chain, once a driver of efficiency,…