Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Prime Cyber Battleground- How Hacktivists and APTs Are Intensifying Attacks

]India has emerged as the globe's number one cyberattack target, with advanced persistent threat (APT) groups and hacktivist groups escalating their cyber assaults. From denial-of-service (DDoS) attacks to high-profile data breaches, cybercriminals are exploiting vulnerabilities in India's rapidly digitizing landscape.

Alleged Oracle Cloud Supply Chain Attack: Six Million Records Stolen, 140K Companies Affected

On March 20, 2025, a Breach Forums user, “rose87168,” claimed to have stolen six million records from Oracle Cloud’s SSO and LDAP services and offered the data for sale or in exchange for zero-day exploits. Breach Forums is a known marketplace for cybercriminals to trade stolen data and exploits.

Phishing Attacks Abuse Microsoft 365 to Bypass Security Filters

Threat actors are abusing Microsoft’s infrastructure to launch phishing attacks that can bypass security measures, according to researchers at Guardz. The attackers compromise multiple Microsoft 365 tenants in order to generate legitimate transaction notifications that contain phishing messages.

Vivek Ramachandran to Speak at Black Hat Asia's 2025 Financial Services Summit on the Evolving Cyber War Against State Actors

PALO ALTO, Calif., - 19 March 2025 - Vivek Ramachandran, Founder of SquareX and a cybersecurity veteran with over two decades of experience, will speak at the Black Hat Asia Financial Services Summit on April 2 2025 at Marina Bay Sands, Singapore. His talk, The War Against State Actors: Bleeding Edge Techniques Targeting Financial Services, will examine how nation-state attackers are evolving their tactics to infiltrate financial institutions and bypass enterprise security controls.

Optimising Supply Chain Cyber Security is Critical to the UK Healthcare and Pharmaceutical Sector

The potential impact on the UK healthcare and pharmaceutical industry from cyber-attacks is front-of-mind for a number of key reasons, including how critical these industries are to everyday life. First, the Intellectual Property (IP) at the operational epicentre of these businesses - collectively worth hundreds of billions in R&D investment annually - makes the pharmaceutical industry an increasingly attractive target for cyber threat actors.

AS-REP Roasting Attack Explained | Real-Life Active Directory Exploit Demo

What is AS-REP Roasting? AS-REP Roasting is an attack that exploits misconfigured Active Directory accounts with disabled Kerberos pre-authentication. Attackers can retrieve password hashes and crack them with minimal effort, leading to unauthorized access. Watch This Real-World Attack Demo Jon Obst, Director of Research at Netwrix, demonstrates: How to Prevent AS-REP Roasting Protect your organization with proactive security controls.

How Attackers Use AI To Spread Malware On GitHub

Github Copilot became the subject of critical security concerns, mainly because of jailbreak vulnerabilities that allow attackers to modify the tool’s behavior. Two attack vectors – Affirmation Jailbreak and Proxy Hijack – lead to malicious code generation and unauthorized access to premium AI models. But that’s not all. Contents hide 1 Jailbreaking GitHub Copilot 1.1 Affirmation jailbreak? “Sure,” let’s exploit the AI system(s) 2 Proxy Hijack.

DNS is the center of the modern attack surface - are you protecting all levels?

If you are a mature organization, you might manage an external IP block of 65,000 IP addresses (equivalent to a /16 network). In contrast, very large organizations like Apple may handle an astonishing 16.7 million IP addresses or more (about a /8 network). However, this isn’t the case for many of us. IP addresses are fixed assets and can be costly, so most modern organizations do not have a large number of directly assigned IP addresses for every service they expose to the internet.