CISA Orders Federal Agencies to Secure F5 Devices After Data Breach
Federal agencies must quickly update F5 devices after nation-state breach. Thousands of F5 products support government and critical systems nationwide.…
F5 Reports Cyberattack, Protects Core Systems From Major Impact
F5 confirmed a cyberattack attributed to a nation-state actor. Investigation found no evidence of supply chain compromise or ongoing exploitation.…
Rep. Swalwell Challenges CISA Over Cybersecurity Workforce Reductions
CISA faces workforce reductions amid cybersecurity and deportation priorities debate. Key partnerships, such as MS-ISAC, have recently ended or changed.…
Researchers Intercept Sensitive Data Using Low-Cost Satellite Gear
The study used $600 hardware to capture unencrypted satellite transmissions worldwide. Researchers found sensitive messages, calls, and military data sent…
Microsoft Patches 175 Flaws, Responds to Active Zero-Day Attacks
Microsoft patched 175 vulnerabilities, its largest update this year. Two actively exploited zero-days were addressed in the release. Older hardware…
Authorities Seize $15B in Bitcoin Tied to Prince Group Cybercrime Network
Authorities seized $15 billion worth of Bitcoin from Prince Group’s alleged leader. Sanctions targeted over 146 individuals and entities linked…
LevelBlue Expands Security Offerings with Cybereason Acquisition
LevelBlue plans to acquire Cybereason, expanding its managed security services. Cybereason’s valuation has fluctuated, leading to restructuring and IPO withdrawal.…
Chinese Hackers Exploit ArcGIS Features for Long-Term Espionage
Flax Typhoon used ArcGIS features to maintain covert access for a year. The group leveraged backups, turning recovery into a…
Fortra Confirms Attacks Exploiting GoAnywhere MFT Security Flaw
Fortra confirmed active exploitation of CVE-2025-10035 in GoAnywhere MFT. Researchers are still questioning how attackers obtained the necessary private key.…
Hackers Breach SonicWall Cloud Backup, Exposing Customer Firewall Data
SonicWall confirmed attackers accessed all cloud backup firewall configurations. Researchers say stolen files could aid further targeted cyberattacks. SonicWall has…
