Search results for: “network security”
-

US Agencies Propose Ban on TP-Link Networking Devices Over Security Concerns
The US government is reportedly considering a ban on TP-Link networking devices due to national security concerns, following an investigation by federal agencies. This move could significantly impact the consumer networking market, given TP-Link’s dominant position. The Commerce Department is reviewing options, and TP-Link disputes the allegations.
-

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks
Federal prosecutors in the United States have indicted three individuals, including cybersecurity professionals, for allegedly hacking into the networks of five U.S. companies using BlackCat (also known as ALPHV) ransomware between May and November 2023. The group is accused of deploying the ransomware and extorting victims for cryptocurrency payments.
-

Cybercriminals Exploit Legitimate Remote Tools to Target Logistics Networks
Cybercriminals are increasingly targeting the logistics and freight industry by exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access, with the ultimate goal of stealing cargo.
-

The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
Security Operations Centers (SOCs) are struggling to keep pace with the volume of daily alerts, often dedicating significant time to false positives and reactive adjustments to detection rules. A lack of environmental context and relevant threat intelligence hampers analysts’ ability to efficiently verify malicious alerts, leading to excessive manual triage of benign notifications. Addressing the…
-

YouTube Ghost Network Leverages Deceptive Tactics for Widespread Malware Distribution
A sophisticated and coordinated malware distribution operation, dubbed the “YouTube Ghost Network” by Check Point Research, has been actively exploiting YouTube’s features to promote malicious content and distribute information-stealing malware.
-

Cybersecurity Overhaul: Thales and Imperva Unite for Integrated Security
Thales and Imperva are combining forces to offer businesses a truly unified defense, from data protection to application security, integrating AI and machine learning for advanced threat detection and a stronger security posture.
-

F5 Networks breach: what we know about the October 2025 incident
F5 Networks said its engineering systems were breached in October 2025 and that attackers removed development materials including code and reports.
-

SesameOp Backdoor Leverages OpenAI API for Stealthy Command and Control
Microsoft has identified a novel backdoor, dubbed “SesameOp,” that utilizes OpenAI’s Assistants API as a command-and-control (C2) channel. This sophisticated technique allows threat actors to stealthily orchestrate malicious activities within compromised environments, potentially evading traditional security measures.
-

U.S. Prosecutors Indict Three in BlackCat Ransomware Scheme
Federal prosecutors in the United States have indicted three individuals for allegedly operating as part of a BlackCat (ALPHV) ransomware operation, targeting five U.S. companies and extorting significant sums.
-

SleepyDuck Malware Evolves with Ethereum C2 Resilience
A new sophisticated remote access trojan, dubbed “SleepyDuck,” has been discovered in the Open VSX registry, a marketplace for IDE extensions. Initially published as a benign extension on October 31, 2025, it was updated on November 1, 2025, to include malicious capabilities and has since garnered over 14,000 downloads.