Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Kenya Kicks Off 'Code Nation' With a Nod to Cybersecurity

The African country aims to train 1 million workers in tech skills in the short term, with a focus on software engineering, cybersecurity, and data science.

DARKReading
'CitrixBleed 2' Wreaks Havoc as Zero-Day Bug

The same APT hammered critical bugs in Citrix NetScaler (CVE-2025-5777) and the Cisco Identity Service Engine (CVE-2025-20337) in a sign of growing adversary interest in identity and access management systems.

#cisco#zero_day
Google Looks to Dim 'Lighthouse' Phishing-as-a-Service Op

The phishing kit, run by a group known as the "Smishing Triad," has powered massive amounts of unpaid tolls and package tracking texts.

Microsoft Exchange 'Under Imminent Threat,' Act Now

Threats against Microsoft Exchange continue to mount, but there are steps both organizations and Microsoft can take to limit them.

Phishing Tool Uses Smart Redirects to Bypass Detection

A campaign against Microsoft 365 users leverages Quantum Route Redirection, which simplifies previously technical attack steps and has affected victims across 90 countries.

Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs

Security teams may have a less burdensome rollout in November after October's Goliath Patch Tuesday, but shouldn't wait on a few top-priority fixes.

Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity

Cybercriminals are weaponizing AI voice cloning and publicly available data to craft social engineering scams that emotionally manipulate senior citizens—and drain billions from their savings.

Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity

From intelligence analysts to surface warfare officers, military veterans of all backgrounds are successfully pivoting to cybersecurity careers and strengthening the industry's defense capabilities.

Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk

Konni, a subset of the state-sponsored DPRK cyberespionage group, first exploits Google Find Hub, which ironically aims to protect lost Android devices, to remotely wipe devices.

OWASP Highlights Supply Chain Risks in New Top 10 List

Security misconfiguration jumped to second place while injection vulnerabilities dropped, as organizations improve defenses against traditional coding flaws.