2025 State of SaaS Backup and Recovery Report
Summary: The modern workplace has shifted towards hybrid work, increasing reliance on cloud-based SaaS applications, which has led to heightened cyberthreats. The 2025 State of SaaS Backup and Recovery Report reveals alarming trends in data loss and recovery confidence among IT professionals. Organizations are urged to strengthen their data resilience strategies to navigate these challenges effectively.…
Read More

Victim: CENTRIC.EU Country : NL Actor: clop Source: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/centric-eu Discovered: 2025-01-24 08:06:41.814552 Published: 2025-01-24 08:06:41.814552 Description : Centric.EU is an information technology company located in Europe. Offers inventive and reliable IT solutions. Specializes in software development and IT outsourcing. Provides cloud services and managed services. Engages in business process outsourcing and mobility solutions.…
Read More
From Noise to Clarity: The Value of MalOp™ Technology in Modern Cyber Defense
This article discusses the latest MITRE ATT&CK® Evaluations for 2024, focusing on advanced threats such as ransomware and macOS attacks. It highlights Cybereason’s MalOp™ technology, which offers a comprehensive view of attacker activities, enhancing security operations by reducing alert fatigue and improving incident response. Affected: Windows, macOS

Keypoints :

The MITRE ATT&CK® Evaluations assess how well security vendors combat advanced threats.…
Read More
Multiple Cybersecurity Giants’ Account Credentials Leaked and Sold on Dark Web; Ministry of Industry and Information Technology Warns: Beware of Androxgh0st Botnet Risks | NiuLan – Security Niu
A recent report reveals that multiple cybersecurity firms have had their account credentials leaked and are being sold on the dark web. This poses risks not only to the companies involved but also to their customers. Additionally, the Ministry of Industry and Information Technology highlights the ongoing threat of the Androxgh0st botnet, which targets IoT devices and network infrastructure.…
Read More
CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380 Detection: CISA and FBI Warn Defenders of Two Exploit Chains Using Critical Ivanti CSA Vulnerabilities – SOC Prime
Recent vulnerabilities in Ivanti Cloud Service Appliances (CSA) pose significant risks, allowing adversaries to exploit them through various chains. The CISA and FBI alert highlights the need for immediate action, as attackers have been able to gain access, execute remote code, and compromise sensitive networks. Affected: Ivanti Cloud Service Appliances, Enterprise Security

Keypoints :

Ivanti Cloud Service Appliances (CSAs) face critical vulnerabilities tracked as CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380.…
Read More
CTI REPORT – LockBit 3.0
LockBit 3.0 ransomware primarily targets Windows systems, exploiting vulnerabilities in Active Directory and Microsoft Exchange Server. It employs various tactics for initial access, data encryption, and data exfiltration, threatening victims with public data leaks unless ransoms are paid. LockBit has been particularly active in sectors such as healthcare, finance, and critical infrastructure, leveraging advanced techniques to evade detection.…
Read More
DOJ indicts two Americans for running laptop farm used in North Korea IT worker scam
Summary: The Justice Department has indicted five individuals for facilitating a scheme that allowed North Korean nationals to secure employment with U.S. companies, generating substantial revenue for the North Korean government. The operation involved using forged documents and remote access software to enable North Koreans to work from abroad while laundering the earnings through a Chinese bank account.…
Read More
FBI: North Korean IT workers steal source code to extort employers
Summary: The FBI has issued a warning about North Korean IT workers who exploit their access to steal source code and extort U.S. companies. These workers often impersonate legitimate staff and utilize various tactics to conceal their identities, posing significant security risks to organizations. The FBI has recommended measures to mitigate these threats, including verifying identities and monitoring network activity.…
Read More
LinkedIn sued for allegedly training AI models with private messages without consent
Summary: LinkedIn Premium customers are suing the platform for allegedly sharing their private messages with third parties without consent to train AI models. The lawsuit claims that LinkedIn enabled data sharing by default and failed to adequately disclose this in its privacy policy. Users argue that their messages are now embedded in AI models, which cannot be reversed, raising significant privacy concerns.…
Read More
CISA: Ivanti Vulns Chained Together in Cyberattack Onslaught
Summary: Cyberattackers are exploiting multiple Ivanti vulnerabilities to compromise the company’s Cloud Service Appliance (CSA). CISA and the FBI have identified several critical vulnerabilities that allow attackers to gain initial access and execute remote code on victim networks. Organizations are urged to upgrade their systems and implement detection methods to mitigate these threats.…
Read More

Victim: WorldNet Telecommunications LLC Country : PR Actor: akira Source: Discovered: 2025-01-23 14:50:37.795226 Published: 2025-01-23 14:50:32.167431 Description : WorldNet provides a comprehensive range of technology solutions for companies. Services include digital security, IT consulting, and voice and data services. Offers cloud services and broadband Internet solutions.…
Read More
Doti AI Launches Platform to Securely Find Enterprise Data
Summary: Organizations are facing challenges in managing and retrieving data stored across multiple applications, making enterprise search increasingly complex. Doti AI, a new AI-powered platform, aims to streamline data access while ensuring data security by consolidating information and implementing strict access controls. The platform allows users to efficiently find relevant information within their workflows without compromising sensitive data.…
Read More
Finnish investigators suspect Baltic Sea cable damage was intentional
Summary: Finnish authorities are investigating the Eagle S oil tanker for potentially severing subsea cables intentionally on Christmas Day. The investigation is ongoing, with suspicions raised about the crew’s actions while dragging the anchor for an extended distance. The case has sparked debate over whether the incidents are accidental or part of a deliberate pattern of behavior.…
Read More
From SIEM to Ticketing: Streamlining Security Operations with Cado’s Export Capabilities
Cado’s export capabilities enhance security operations by streamlining data flow between SIEMs, ticketing systems, and forensic platforms. This integration reduces manual errors, improves efficiency, and ensures timely incident resolution. Affected: Cado platform, SIEMs, ticketing systems

Keypoints :

Modern SOCs face challenges with manual data transfers and incompatible formats.…
Read More
Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)
Summary: Cisco has issued critical software updates to address a privilege escalation vulnerability (CVE-2025-20156) in its Meeting Management system, allowing remote attackers to gain administrator access. Additionally, patches were released for a denial-of-service (DoS) flaw in BroadWorks and an integer underflow bug in ClamAV. The vulnerabilities highlight ongoing security challenges faced by organizations using Cisco products.…
Read More