IoT Security

How Is Trusted AI Being Used to Spread Malware?
Endpoint & Device Security How Is Trusted AI Being Used to Spread Malware?

A sophisticated and deeply deceptive cyberattack methodology has emerged, weaponizing the very AI platforms that users have come to trust for reliable information, including OpenAI's ChatGPT and xAI's Grok. This attack vector, known as the "ClickFix Style Attack," leverages a potent combination of

Can a DVR Botnet Sink Maritime Operations?
Endpoint & Device Security Can a DVR Botnet Sink Maritime Operations?

In an era where global commerce relies heavily on the seamless operation of maritime vessels, a seemingly benign piece of surveillance equipment has emerged as a potential gateway for catastrophic digital sabotage. The recent identification of a sophisticated, Mirai-based botnet named "Broadside"

'Broadside' Mirai Botnet Targets Maritime Logistics Sector
Endpoint & Device Security 'Broadside' Mirai Botnet Targets Maritime Logistics Sector

In an era where global commerce relies on the seamless movement of goods across oceans, a new and insidious threat has emerged not from pirates on the high seas, but from malicious code lurking within the very systems designed to protect these vital assets. A sophisticated variant of the Mirai

Chinese APT PlushDaemon Hijacks Updates via DNS on Routers
Endpoint & Device Security Chinese APT PlushDaemon Hijacks Updates via DNS on Routers

A quiet edit to trust at the edge Automatic updates were sold as the safest way to stay secure, until a quiet actor rewired that trust at your router and turned routine downloads into covert couriers. The scheme did not smash through vendor gates or crash endpoints; it simply nudged traffic at the

How Are Hackers Hijacking Thousands of ASUS Routers Worldwide?
Endpoint & Device Security How Are Hackers Hijacking Thousands of ASUS Routers Worldwide?

What happens when the gateway to your digital world becomes a backdoor for cybercriminals? Right now, tens of thousands of ASUS routers across the globe are being hijacked in a sophisticated operation dubbed Operation WrtHug, catching the attention of cybersecurity experts and exposing a terrifying

The Hidden Risks of Non-Human Identities in SaaS Ecosystems
Endpoint & Device Security The Hidden Risks of Non-Human Identities in SaaS Ecosystems

What happens when the most trusted entities in a company's digital landscape aren't even human? In today's SaaS-driven world, countless operations are powered by non-human identities (NHIs)—think AI assistants, automation bots, and API tokens. These invisible forces streamline workflows and boost

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later