Latest Cybersecurity News and Articles


Commvault Shares IoCs After Zero-Day Attack Hits Azure Environment

01 May 2025
Commvault provides indicators of compromise and mitigation guidance after a zero-day exploit targeting its Azure environment lands in CISA’s KEV catalog. The post Commvault Shares IoCs After Zero-Day Attack Hits Azure Environment appeared first on SecurityWeek.

Why top SOC teams are shifting to Network Detection and Response

01 May 2025
Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced adversaries who have become experts at evading endpoint-based defenses and signature-based detection systems. The reality of these “invisible intruders” is driving a significant need for a multi-layered approach to detecting threats,

Chinese APT’s Adversary-in-the-Middle Tool Dissected

01 May 2025
ESET has analyzed Spellbinder, the IPv6 SLAAC spoofing tool Chinese APT TheWizards uses to deploy its WizardNet backdoor. The post Chinese APT’s Adversary-in-the-Middle Tool Dissected appeared first on SecurityWeek.

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

01 May 2025
Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an "influence-as-a-service" operation to engage with authentic accounts across Facebook and X. The sophisticated activity, branded as financially-motivated, is said to have used its AI tool to orchestrate 100 distinct persons on the two social media platforms, creating a

Actions Over Words: Career Lessons for the Security Professional

01 May 2025
In a world full of noise and promises, it’s those who consistently deliver behind the scenes who build the most respected and rewarding careers. The post Actions Over Words: Career Lessons for the Security Professional appeared first on SecurityWeek.

SonicWall Flags Two More Vulnerabilities as Exploited

01 May 2025
SonicWall has updated the advisories for two vulnerabilities to warn that they are being exploited in the wild. The post SonicWall Flags Two More Vulnerabilities as Exploited appeared first on SecurityWeek.

New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk

01 May 2025
For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools became, the less useful their results proved to be. As alerts from static analysis tools, scanners, and CVE databases surged, the promise of better security grew more distant. In its place, a new reality took hold—one defined by alert fatigue and overwhelmed teams. According to OX

DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

01 May 2025
Russian companies have been targeted as part of a large-scale phishing campaign that's designed to deliver a known malware called DarkWatchman. Targets of the attacks include entities in the media, tourism, finance and insurance, manufacturing, retail, energy, telecom, transport, and biotechnology sectors, Russian cybersecurity company F6 said. The activity is assessed to be the work of a

Ascension Discloses Data Breach Potentially Linked to Cleo Hack

01 May 2025
Ascension is notifying over 100,000 people that their personal information was stolen in a data breach potentially linked to the Cleo hack. The post Ascension Discloses Data Breach Potentially Linked to Cleo Hack appeared first on SecurityWeek.

SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers

01 May 2025
SentinelOne has shared some information on the types of threat actors that have targeted the security firm recently. The post SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers appeared first on SecurityWeek.

Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach

01 May 2025
Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. "This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide assistance," the company

SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

01 May 2025
SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below - CVE-2023-44221 (CVSS score: 7.2) - Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to

World Password Day: What’s next for password security?

01 May 2025
This World Password Day, cybersecurity leaders are reflecting on how far passwords have come, and how much farther they have to go. 

Alleged ‘Scattered Spider’ Member Extradited to U.S.

30 April 2025
A 23-year-old Scottish man thought to be a member of the prolific Scattered Spider cybercrime group was extradited last week from Spain to the United States, where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors allege Tyler Robert Buchanan and co-conspirators hacked into dozens of companies in the United States and abroad, and that he personally controlled more than $26 million stolen from victims.

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

30 April 2025
As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report from Tenable. MCP, launched by Anthropic in November 2024, is a framework designed to connect

Tech Giants Propose Standard For End-of-Life Security Disclosures

30 April 2025
The OpenEoX model proposes a shared data format that can be integrated into SBOMs, security advisories, and other ecosystem tools.  The post Tech Giants Propose Standard For End-of-Life Security Disclosures appeared first on SecurityWeek.

41% of organizations struggle to find and retain cyber professionals

30 April 2025
New data notes an increase in cybersecurity concern among tech executives. 

RSA Conference 2025 Announcement Summary (Day 2) 

30 April 2025
Hundreds of companies are showcasing their products and services this week at the 2025 edition of the RSA Conference in San Francisco. The post RSA Conference 2025 Announcement Summary (Day 2)  appeared first on SecurityWeek.

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

30 April 2025
How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t need to “hack” in—they can trick their way in. Deepfakes, impersonation scams, and AI-powered social engineering are helping them bypass traditional defenses and slip through unnoticed. Once inside, they can take over accounts, move laterally, and cause long-term damage—all without

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

30 April 2025
A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. "Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and