Security Spotlight

A Record Year Cybersecurity Acquisitions in 2025 Surpass $84 Billion
Cybersecurity
A Record Year: Cybersecurity Acquisitions in 2025 Surpass $84 Billion
A remarkable year in cybersecurity M&A, 2025 saw total disclosed deals exceeding $84 billion. Eight significant acquisitions surpassed the $1 billion mark, representing a notable ...
Malicious NPM Package ‘Lotusbail’ Targets WhatsApp Credentials
Application Security
Malicious NPM Package ‘Lotusbail’ Targets WhatsApp Credentials
The malicious NPM package ‘Lotusbail’ covertly stole WhatsApp credentials through a backdoor. With more than 56,000 downloads over a six-month period, it emphasized the need ...
n8n Automation Platform Faces Severe Security Issue
Application Security
n8n Automation Platform Faces Severe Security Issue
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Nissan Cyberattack Hackers Compromise Red Hat GitLab Instances
Data Security
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Application Security
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Application Security
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
Identity and Access Management
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
A cryptocurrency mining campaign targets AWS customers by exploiting stolen Identity and Access Management credentials. Detected by Amazon's GuardDuty, the attack uses novel persistence techniques ...
All I Want for Christmas is All of Your Data SantaStealer Malware Spreads for the Holidays
Cybersecurity
All I Want for Christmas is All of Your Data: SantaStealer Malware Spreads for the Holidays
A cybercriminal's holiday dream, SantaStealer, a new information-stealing malware, promises undetected operation on systems of high-profile targets, advertised on Telegram for $175 monthly.
SoundCloud's VPN Restrictions Lead to Access Denials for Users
Cybersecurity
SoundCloud’s VPN Restrictions Lead to Access Denials for Users
Users attempting to access SoundCloud via VPN connections are encountering a 403 forbidden error, resulting in blocked access to the audio streaming platform. This issue ...
Email Scam Exploits PayPal's Subscriptions Billing Feature
News
Email Scam Exploits PayPal’s Subscriptions Billing Feature
PayPal's legitimate billing feature becomes a tool for scammers sending fraudulent emails, mimicking genuine purchase notifications. This latest financial scam uses deception to its full ...