Crypto Scams in Firefox

Screenshot 2025 07 02 234934

Mozilla Firefox add-on ecosystem has recently become the target of a sophisticated and dangerous attack. Over 40 fake cryptocurrency wallet extensions were discovered in the Firefox Add-ons Store, mimicking popular digital wallets such as Ledger, MetaMask, Trezor, and Rabby. These malicious add-ons are designed with one purpose – to steal users’ seed phrases and drain […]

Defending Infrastructure from Cyber Threats

Protecting Critical Infrastructure from Emerging Nation State Cyber Threats

In today’s interconnected world, cyber threats from nation-state actors pose significant risks to essential services and national security. Recent alerts from leading U.S. cybersecurity agencies warn of increasing activity by Iranian-affiliated cyber actors targeting vulnerable networks across government, energy, finance, healthcare, and technology sectors. These state-sponsored threats are sophisticated and persistent, using a variety of […]

SEC’s New Data Privacy Rules

How the SEC Is Redefining Data Privacy in Financial Services

Financial institutions are now operating under tighter scrutiny with the SEC’s newly adopted amendments to Regulation S‑P. These updates mark a significant shift in how broker-dealers, investment advisers, and transfer agents must safeguard client data, respond to security incidents, and notify affected individuals. This move comes in response to a growing number of cyber breaches […]

GIFTEDCROOK’s Silent Threat

Screenshot 2025 06 29 002926

On June 28, cybersecurity researchers confirmed that the GIFTEDCROOK malware has evolved from a basic data stealer into a powerful intelligence-gathering weapon. Once known for stealing browser credentials and cookies, GIFTEDCROOK is now targeting sensitive documents from high-value sectors like government, finance, and healthcare. Recent attacks show that threat actors are actively using this malware […]

New York’s Cyber Mandate

Screenshot 2025 06 28 194930

The insurance industry is facing an unprecedented surge in Cyber threats against public agencies have reached a critical tipping point. In response, New York State has enacted a new law that marks a major leap in government cyber accountability. The legislation now mandates that municipalities and local public authorities report cyberattacks within 72 hours and […]

LapDogs & ORB Espionage

Screenshot 2025 06 27 231653

In the dim corridors of global cyber activity, a new actor has emerged not as a singular attacker, but as a silent, distributed network weaving through homes and small offices. The LapDogs campaign, uncovered by SecurityScorecard’s STRIKE team, presents a chilling example of how inconspicuous devices can be transformed into powerful espionage tools. This discovery reveals over […]

African Banks Under Siege

Screenshot 2025 06 26 225137

Cybersecurity threats are no longer limited to sophisticated malware built in the shadows. Increasingly, open-source tools-widely used for legitimate testing and development-are being exploited by cybercriminals to breach financial institutions across Africa. This evolution marks a significant shift in attacker behavior. Open-source frameworks such as Metasploit, Cobalt Strike, and Empire are enabling attackers to conduct […]

The AI Readiness Gap

Screenshot 2025 06 26 221538

The AI Security Wake-Up Call The rapid evolution of artificial intelligence has ushered in a new frontier for productivity, personalization, and automation across every sector-from finance and healthcare to retail and SaaS. But as adoption skyrockets, one truth becomes painfully clear: the vast majority of organizations are dangerously unprepared for the cybersecurity threats emerging alongside […]

SAP & Citrix: Hidden Threats

Screenshot 2025 06 26 130629

SAP’s latest security bulletin sent ripples through enterprise IT teams, uncovering flaws in one of the most used enterprise tools: SAP GUI. Two medium-severity vulnerabilities (CVE-2025–0055 and CVE-2025–0056) in SAP GUI for Windows and Java reveal how innocuous features can evolve into exploitable weak points particularly when they handle sensitive memory. At the heart of […]

Aflac Cybersecurity Incident

Screenshot 2025 06 25 194222

In today’s digital landscape, trust forms the backbone of business operations, especially in industries managing sensitive personal information. On June 25, 2025, Aflac, a leading US health and life insurance provider, revealed it was investigating a cybersecurity incident affecting its US network. Although investigations are ongoing, early indicators suggest the attack may be linked to […]