Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New RMM Abuse Exposes Remote Access Blind Spots in U.S. and EU Companies

Can your SOC prove when a trusted remote access tool becomes unauthorized access? That is the challenge behind the latest RMM abuse targeting companies in the U.S. and Europe. Attackers are using phishing pages to deliver legitimate remote access software, making malicious activity look like routine IT work. For CISOs, the risk is clear: if the team cannot see how the tool entered the environment, what executed, and where the connection went next, containment slows down and business exposure grows.

How Telecom Operators Can Secure OSS/BSS Stacks

Telecom security conversations still orbit around the network. Firewalls, signaling protection, DDoS mitigation-those get budget and attention. Meanwhile, the systems that handle billing, subscriptions, and customer data often sit in the background, treated as operational plumbing rather than a primary risk surface.

The UK Government's Open Letter on AI Cyber Threats Underscores the Need for Measurable Security

A recent open letter from the UK government on AI-driven cyber threats highlights a clear shift in the threat landscape. Cyberattacks are no longer constrained in the same way by human expertise, as advanced AI models can now help identify vulnerabilities, generate exploit code, and increase the speed and scale of attacks.

Payment Infrastructure Is Now Part of the Attack Surface

Every payment creates a moment of trust. A customer enters card details, a gateway approves or rejects the transaction, fraud checks run in the background, and sensitive data moves between systems in seconds. When that process works, it feels invisible. When it fails, the damage can reach far beyond a lost sale.

PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers

Mend’s security research team has identified a previously undocumented fifth wave of the PhantomRaven campaign, an ongoing NPM supply chain attack that has been stealing developer credentials and secrets since August 2025. This new wave uses a fresh command-and-control server, 33 new malicious packages, and a more sophisticated three-stage payload chain.

How to Stop Digital Impersonation Attacks: Why Email Authentication Alone Isn't Enough

Phishing reports and customer complaints are not early warning signals. By the time they arrive, attackers have already built the infrastructure. Lookalike domains are live, credential harvesting pages are indexed, and the exposure window is open. To stop digital impersonation attacks, organizations need to shift detection to the infrastructure preparation stage, before distribution begins.

Turning Attackers into Signals: How Deception is Redefining Threat Detection | Fidelis Security

Traditional detection methods are struggling to keep up with modern threats. What if you could turn attackers into your strongest signal? In this session, our Sales Engineer Jim breaks down how deception technology is transforming cybersecurity by: Delivering high-fidelity alerts with minimal noise Adapting dynamically to attacker behavior Extending protection to IoT and non-standard devices Scaling seamlessly across enterprise environments.

CyberPhysical Security: Protecting the Modern EV Charging Perimeter

Electric vehicles have crossed from niche technology into mainstream infrastructure. Charging networks now form a critical layer of both the energy grid and the transportation system, and attackers have noticed. EV charging sits at a three-way intersection of cloud software, operational technology, and automotive systems. Each domain has its own threat model, its own tooling, and its own team assuming someone else owns the risk. That gap is where adversaries operate.

Inside the Hidden VM: How Attackers Stay Undetected

Threat actors are getting better at hiding in plain sight through using virtual environments to evade detection and deliver ransomware. New research from Sophos X-Ops reveals an increase in the abuse of QEMU, an open-source emulator, to conceal malicious activity inside virtual machines. While this technique isn’t new, its use for defense evasion is accelerating, making visibility and detection even more challenging for defenders.