SonicWall SSL VPN Compromise

A Serious Breach Uncovered Security firm Huntress has raised the alarm over a large-scale breach targeting SonicWall SSL VPN devices. Over 100 accounts across 16 customer environments were compromised beginning October 4, 2025, with unauthorized logins traced to a single external IP address. In some incidents, attackers quietly disconnected after minimal access. In others, they […]
MS Teams as an Attack Vector

In October 2025, Google’s Threat Intelligence Group and Mandiant revealed a sophisticated campaign targeting organizations using Oracle’s E-Business Suite (EBS). Dozens of companies were compromised via a zero-day flaw (CVE-2025-61882, CVSS 9.8), with intrusion activity traced back to August 2025. While the full breadth of damage is still under investigation, the breach displays classic extortion […]
MS Teams as an Attack Vector

The Threat Landscape Recent reports reveal that threat actors are abusing Microsoft Teams in novel and concerning ways. Rather than just targeting endpoints or networks, adversaries are leveraging Teams for extortion, social engineering, and bypassing Multi-Factor Authentication (MFA). This shift underscores a broader trend: platforms once considered “trusted” can themselves become weapons in attackers’ arsenals. […]
Weaponizing Generative Tools

In the first half of 2025, Russian threat actors escalated their AI-driven cyber operations against Ukraine, turning generative models from novelty tools into potent weapons for phishing and malware. The Ukrainian State Service for Special Communications (SSSCIP) reported over 3,000 cyber incidents during this period-a sharp uptick from the latter half of 2024. These attacks […]
When AI Tools Are Misused

OpenAI recently took a bold step: it banned a number of ChatGPT accounts connected to Chinese (and also some Russian) entities that were using the platform for surveillance, phishing, and malware development. The company’s findings came from its public threat intelligence reports, and they highlight a growing concern in the AI era: how powerful tools […]
Redis’s 13-Year “Sleeping” Flaw

In October 2025, a startling revelation emerged: a use-after-free vulnerability-present in Redis for an estimated 13 years-has now been classified with a CVSS score of 10.0. Known as CVE-2025-49844(or “RediShell”), this flaw allows an authenticated attacker to craft a malicious Lua script that breaks out of Redis’s Lua sandbox and executes arbitrary native code on […]
Critical Redis Vulnerability

A recently discovered use-after-free vulnerability in Redis (CVE-2025-49844) has raised significant concerns among cybersecurity professionals. This flaw, affecting all Redis versions with Lua scripting enabled, allows authenticated users to execute arbitrary code remotely, potentially compromising the entire Redis instance and its underlying system. Vulnerability Overview The issue arises from how Redis handles memory management within […]
Revolutionizing Penetration Testing with AI

The latest release of Kali Linux 2025.3 introduces a groundbreaking tool for cybersecurity professionals: the Gemini Command-Line Interface (CLI). This open-source package seamlessly integrates Google’s powerful Gemini AI directly into the terminal, offering penetration testers and security experts an intelligent assistant designed to streamline and automate complex security workflows. Transforming Penetration Testing Workflows Traditionally, penetration […]
Palo Alto Networks Portals

On October 3, 2025, cybersecurity firm GreyNoise reported a significant uptick in scanning activity targeting Palo Alto Networks login portals, marking a nearly 500% increase in unique IP addresses compared to previous observations. This surge, involving approximately 1,300 unique IP addresses, underscores a growing threat landscape where attackers are actively probing network defenses for vulnerabilities. […]
WestJet Breach

Canadian carrier WestJet recently confirmed a data breach that impacted around 1.2 million customers, revealing vulnerabilities even in established, high-visibility industries. While payment data and passwords remained safe, exposed records included names, travel documents, contact details, loyalty program information, and reservation metadata. The Anatomy of the Breach The intrusion was first detected June 13, 2025, […]