Rubrik Tightens Security After Detecting Potential Key Exposure

Rubrik, a popular data protection and cybersecurity firm, recently found an unusual activity on the server containing log files. In response to this activity, the company proactively rotated its authentication keys to avoid potential security incidents. What Happened? In February 2025, Rubrik’s security team detected suspicious behavior on the log server. As a safety measure, … Continued

Dent in China’s Great Firewall (GFW)

The Researchers have identified a major vulnerability in China’s Great Firewall (GFW), dubbed as Wallbleed. This flaw allowed censorship middleboxes to expose more than 125 bytes of their memory when processing crafted DNS queries. This could potentially leak sensitive information.  The Big Picture This vulnerability allowed researchers to take an unprecedented look into the internal … Continued

Iran-Linked Hackers Target UAE with ‘Sosano’ Malware

 A recent report reveals that Iranian-aligned hackers, identified as UNK_CraftyCamel, are leveraging polyglot files to breach UAE-based organisations as part of an ongoing cyber-espionage campaign. In October 2024, the adversary compromised the email account of an Indian electronics company “ INDIC Electronics” to send malicious messages. The malicious email contains a URL “https://indicelectronics[.]net/or/1/OrderList.zip” which downloaded … Continued

🔴 U.S. Suspends Cyber Operations Against Russia Amid Diplomatic Push

📌 A Strategic Shift in U.S. Cyber PolicyIn a bold move, the U.S. Department of Defense has halted all offensive cyber operations targeting Russia. This aligns with President Trump’s diplomatic initiative to reset relations with Moscow and seek solutions to the ongoing Ukraine conflict. 📌 Political Fallout & National Security ConcernsThe decision has triggered strong … Continued

Lazarus Group’s Next Move?

Fresh off their audacious $1.5B crypto heist from Bybit, Lazarus group caught setting its sights on a new target: IOHK, the blockchain engineering company based in hong kong. Since 2017, the Lazarus Group has siphoned more than $6 billion dollar worth of crypto from exchanges and companies. The Lazarus Group: Kim’s Cyber Army Lazarus is … Continued

Dark Web Threat : Qilin Group Behind Lee Enterprises Breach

Qilin, a Russian-speaking cybercrime group known for double extortion is now threatening Lee Enterprises, saying that they’ll leak sensitive information, if they are not willing to pay ransom. Why it matters Lee Enterprises is a publicly traded company and one of the largest newspaper groups in the United States. Its portfolio includes popular publications like … Continued

Top 10 XDR Solutions in 2025

Understanding what XDR is ? XDR stands for Extended Detection and Response. It is an advanced version of Endpoint Detection and Response (EDR) that pulls in other security tools and coordinates everything from the cloud. While system coordination occurs on the cloud, detection and remediation actions need to be implemented by on-site modules. The extent to … Continued

Network Security

What is Network Security  Gartner defines network security as “the measures taken to protect a communications pathway from unauthorized access to, and accidental or willful interference of, regular operations”. In simple, it means protecting the network from cyberattacks. Network security involves a wide range of strategies from hardware to software, firewalls, intrusion detection systems (IDS), … Continued

Payment Security Solutions

Understanding Payment Security Payment security refers to the safeguarding of sensitive financial information, such as credit card details, bank account numbers, and personal identification data, during digital transactions. The main goal of payment security is to ensure that payment data is transmitted safely without getting intercepted by malicious actors. What is Payment Security Solutions Payment … Continued

What is Attack Surface Management? (ASM)

As the saying goes,You can’t protect what you don’t know exists. ASM ensures you have full visibility and control over your attack surface, allowing you to secure your digital environment and safeguard your business from cyber threats. Attack Surface Management (ASM) is the ongoing process of monitoring, addressing, and minimizing security risks across an organization’s … Continued

Newsletter line