ICYMI: 2025-04-18
Latest Headlines
Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
[Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform
The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools
In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged
How to Implementing SOAR To Reduce Incident Response Time Effectively
How To Prioritize Threat Intelligence Alerts In A High-Volume SOC
Detecting And Responding To New Nation-State Persistence Techniques
Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN
Securing the Digital Transformation Journey – What CISOs Must Consider
How to Build a Security Champions Program Within Your Organization
Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released
Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry
Interlock ransomware gang pushes fake IT tools in ClickFix attacks
OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits
FBI: Scammers pose as FBI IC3 employees to ‘help’ recover lost funds
ASUS warns of critical auth bypass flaw in routers using AiCloud
Chinese hackers target Russian govt with upgraded RAT malware
Cisco Webex bug lets hackers gain code execution via meeting links
– MTZ