Europe Launches Major Plan to Build Quantum-Secure Infrastructure

The European Union has officially launched a bold new initiative called the Quantum Europe Strategy. This plan aims to make Europe a global leader in quantum technology by 2030, focusing on both innovation and cybersecurity. With quantum computing advancing quickly, the EU wants to prepare its infrastructure to stay safe and competitive in the digital … Continued

Stealthy Firefox Extensions Drain Crypto Wallets in Ongoing Campaign

A major security warning has surfaced for cryptocurrency users after researchers uncovered over 40 malicious extensions on the Mozilla Firefox Add-ons Store. These extensions were not harmless tools, they were dangerous fakes created to steal users’ crypto wallet information, including secret keys and seed phrases. Many of these fake add-ons managed to stay on the … Continued

Chinese Hackers Exploit Ivanti Zero-Days to Target French Government

Recently, a Chinese hacking group exploited multiple zero-day vulnerabilities in lvanti’s Connect Secure Appliance (CSA) to target sensitive organizations in France. This includes the French government, telecom providers, and companies from sectors like transport, finance, and media. The hacking campaign was discovered in September 2024 and has been linked to a threat group known as … Continued

Cisco Unified CM Vulnerability Exposes Systems to Remote Root Access

A critical vulnerability has been discovered in Cisco’s Unified Communications Manager (Unified CM) and Session Management Edition (SME), which allows an attacker to gain root access without any authentication. This means that someone sitting anywhere in the world could take complete control of a vulnerable system, simply by exploiting a flaw in the software. The … Continued

Chinese Hacker Group Silver Fox Behind New Taiwan Cyberattack

A new cyberattack campaign has been discovered targeting users in Taiwan, and its believed to be carried out by a Chinese threat group known as Silver Fox, also tracked as Void Arachne or Storm-0558. The attackers are using a fake installer for an AI tool called DeepSeek to trick victims into installing malware on their … Continued

New maturity model explains how to protect browsers at work

We talk a lot about cybersecurity in terms of firewalls, zero trust, and endpoint protection. But there’s one key area that’s often overlooked, the browser. Today, more than 85% of modern work is done through a web browser. Whether it’s logging into SaaS apps, accessing internal tools, or copying data, the browser has quietly become … Continued

Newsletter line