Shadow Servers have identified 454 SAP NetWeaver systems vulnerable to a critical zero-day vulnerability that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-31324, allows unauthenticated attackers to upload malicious files to affected systems, potentially leading to…
Tag: Cyber Security News
Weekly Cyber Security News Letter – Last Week’s Top Cyber Attacks & Vulnerabilities
In today’s hyper-connected world, cyber threats are evolving at breakneck speed, making it more crucial than ever to stay informed and vigilant. Each week, our newsletter delivers a curated roundup of the most pressing news, expert insights, and actionable strategies…
Critical IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
A recent security assessment by Shelltrail has uncovered three critical vulnerabilities in the IXON VPN client, potentially allowing attackers to escalate privileges on both Windows and Linux systems. Identified as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02, and CVE-2025-ZZZ-03, these flaws expose users to local…
MDR vs. Traditional Security Operations: What’s Right For Your Penetration Testing Team?
In the ever-changing world of cybersecurity, organizations are constantly challenged to choose the right security operations model that best supports their penetration testing teams. The decision often comes down to selecting between traditional security operations and the more advanced Managed…
Identity and Access Management (IAM) – The CISO’s Core Focus in Modern Cybersecurity
In an era where digital identities have become the primary attack vector, CISOs face unprecedented pressure to secure access across increasingly complex ecosystems. Identity and Access Management (IAM) is no longer a siloed IT function but the cornerstone of organizational…
How Digital Forensics Supports Incident Response: Insights For Security Leaders
Digital forensics and incident response (DFIR) have become fundamental pillars of modern cybersecurity. As cyber threats escalate in complexity and frequency, security leaders are increasingly aware that a reactive approach is no longer sufficient. Instead, organizations must integrate digital forensics…
Navigating Cybersecurity Frameworks – CISO Resource Guide
The role of the Chief Information Security Officer (CISO) has never been more critical. As organizations face a rapidly evolving threat landscape, CISOs must defend against cyberattacks and ensure compliance with a growing patchwork of regulations and standards. Cybersecurity frameworks…
Building Trust Through Transparency – CISO Cybersecurity Practices
In an era of digital transformation and rising cyber threats, Building Trust Through Transparency has become a critical mission for the Chief Information Security Officer (CISO), who has evolved from a technical expert to a strategic leader responsible for protecting…
New Power Parasites Phishing Attack Targeting Energy Companies and Major Brands
A sophisticated phishing campaign dubbed “Power Parasites” has been actively targeting global energy giants and major brands since 2024, according to a comprehensive threat report released this week. The ongoing campaign primarily exploits the names and branding of prominent energy…
DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models
Despite significant disruptions by international law enforcement operations targeting major ransomware schemes, cybercriminal groups continue demonstrating remarkable adaptability in 2025. Two noteworthy ransomware operations, DragonForce and Anubis, have introduced innovative affiliate models designed to expand their reach and increase profitability…