Threats

the latest cybersecurity threat alerts

Oracle Confirms “Obsolete Servers” Hacked Article link: https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/    Phishing Kits Now Vet Victims in Real-Time Before Stealing Credentials Article link:

Criminal Group Claims Responsibility for Cyberattack on Minnesota Casino Article Link: https://cdcgaming.com/brief/cybersecurity-incident-at-minnesota-tribal-community-casino-prompts-shutdown/ As CISA Downsizes, Where Can Enterprises Get Support? Article

11 Ways Cybercriminals are Making Phishing More Potent Than Ever Article Link: https://www.csoonline.com/article/3850783/11-ways-cybercriminals-are-making-phishing-more-potent-than-ever.html Infosec Pro Troy Hunt HasBeenPwned in Mailchimp Phish

NIST Finalizes Differential Privacy Rules to Protect Data Article Link: https://www.darkreading.com/data-privacy/nist-finalizes-differential-privacy-rules-to-protect-data Criminals are Using CSS to Get Around Filters and Track

Massive Research into iOS Apps Uncovers Widespread Secret Leaks, Abysmal Coding Practices Article Link: https://cybernews.com/security/ios-apps-leak-hardcoded-secrets-research/   AI-Assisted Fake GitHub Repositories Fuel

NASCAR Under Attack Along with the NBA as Online Infiltrators Lead Dubious Scams Article Link: https://www.essentiallysports.com/nascar-news-nascar-under-attack-along-with-the-nba-as-online-infiltrators-lead-dubious-scams/ California Shuts Down Data Broker

Anagram Takes a Gamified Approach to Employee Security Training Article link: https://techcrunch.com/2025/02/26/anagram-takes-a-gamified-approach-to-employee-cybersecurity-training/ Understanding OWASP’s Top 10 List of Non-Human Identity Risks

Ghost Ransomware Targets Orgs in 70+ Countries Article Link: https://www.darkreading.com/cyberattacks-data-breaches/ghost-ransomware-targets-orgs-70-countries Palo Alto Networks Confirms Exploitation of Firewall Vulnerability Article Link: https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/

Cybercriminals Use Axios and Node Fetch in 13 million Password Spraying Attempts Article Link: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html Ransomware Payments Decreased 35% Year-over-Year Article

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.