A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk's Department of Government Efficiency (DOGE) transferred gigabytes of sensitive data from agency case files in early March, using short-lived accounts configured to leave few…
Judge limits evidence about NSO Group customers, victims in damages trial | CyberScoop
A U.S. judge limits what evidence NSO Group can present in the WhatsApp spyware trial, blocking arguments about suspected criminal targets and focusing the case on NSO’s conduct.
Multiple top CISA officials behind ‘Secure by Design’ resign | CyberScoop
In a statement to CyberScoop, acting Director Bridget Bean said that encouraging the private sector to build more secure products will continue to be a priority at the agency.
Securing our future: April 2025 progress report on Microsoft’s Secure Future Initiative
The Microsoft Secure Future Initiative (SFI) stands as the largest cybersecurity engineering project in history and most extensive effort of its kind at Microsoft. Now, we are sharing the second SFI progress report, which highlights progress made in our multi-year journey to improve the security posture of Microsoft, our customers, and the industry at large.
Microsoft Entra account lockouts caused by user token logging mishap
Microsoft confirms that the weekend Entra account lockouts were caused by the invalidation of short-lived user refresh tokens that were mistakenly logged into internal systems.
Microsoft strengthens in-house cyber governance, training
The technology giant, as part of its Secure Future Initiative program, has overhauled security practices following a series of crippling nation-state-linked cyberattacks.
Virtual Patching: How to Protect VMware ESXi | CSA
Recent CVEs were patched amid concerns of exploitation. While traditional patching requires downtime, virtual patching allows critical systems to stay online.
State-sponsored hackers embrace ClickFix social engineering tactic
ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia utilizing the tactic to breach networks.
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google's systems, passing all verifications but pointing to a fraudulent page that collected logins.
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
A large-scale ad fraud operation called 'Scallywag' is monetizing pirating and URL shortening sites through specially crafted WordPress plugins that generate billions of daily fraudulent requests.
Five Keys to Choosing a Cloud Security Provider | CSA
Cloud security providers aren't all the same, and knowing what to look for and what questions to ask when making a decision comes down to five keys to success.
Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts
Japanese regulators published an urgent warning about hundreds of millions of dollars worth of unauthorized trades being conducted on hacked brokerage accounts in the country.
AI Red Teaming: Insights from the Front Lines | CSA
Uncover key insights from AI red teaming experts on securing generative AI systems against adversarial attacks, harmful outputs, and infrastructure risks.​
How next-generation firewalls are evolving in a world of AI-enabled cyberattacks
Discover how Next-Generation Firewalls are adapting to combat AI-enabled cyberattacks and evolving to protect organizations in today's dynamic threat landscape.