-
Cybersecurity researchers have discovered over a dozen vulnerabilities in enterprise secure vaults from CyberArk and HashiCorp that, if successfully exploited, can allow remote attackers to crack open corporate identity systems and extract enterprise secrets and tokens from them. The 14 vulnerabilities, collectively named Vault Fault, affect CyberArk Secrets Manager, Self-Hosted, and
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Pentagon wants a secure digital space to easily share classified information with allies and partners. But antiquated policies and fluid dynamics of military diplomacy have made that very challenging.
“Overall, we've done a fairly good job of rolling out cloud capabilities to the [Impact Level] 4 or 5 [unclassified] environment and to the IL 6 [classified] environment,” said John Hale, the Defense Information Systems Agency’s head of product management and development Thursday at Defense One’s Cloud Workshop event. “But where we kind of missed the ball…would be in that coalition world—at the IL 6 level. And so, we're putting a lot of focus right now on how do we solve the cloud capability related specifically to the coalition mission partners at the classified level.”
The Defense Department has been working to simplify the piles of networks military services and combatant commands use to communicate with allies and partners in the Indo-Pacific region with the cloud-based mission partner environment, or MPE. One of the main hurdles is navigating strategic partnerships in which a nation agrees to work with the U.S., but isn’t necessarily an ally by treaty.
“It's not just the Five Eyes mission partners that we've had traditionally. A lot of those coalition networks are with what we would call non-traditional mission partners,” Hale said. “They're our ally right now, and we're working with them on a declassified level. They may not be our ally in six months, but we need to be able to deal with that [data] and manage it appropriately. So we're spending a lot of time and effort right now to focus on how we specifically solve that.”
MPE’s initial rollout is currently confined to the Indo-Pacific, but there’s opportunity to expand.
“INDOPACOM was the primary use case that started all this. We're working very closely with the services on this also,” Hale said. “If it does what we all believe it will do…then we'll roll it out to other theaters.”
But policies and cultural differences also complicate implementing the MPE more broadly.
“We're continuing to battle policies that were written 20 years ago, when networks and capabilities just weren't where they are today,” Hale said. “We were joking upstairs that…the only secure computer is one that's off and unplugged, right? And so we deal in a world where we can't do that. Therefore, we need to provide as much capability around that data and those systems to secure as possible, but without sacrificing function.”
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers are drawing attention to a new campaign that’s using legitimate generative artificial intelligence (AI)-powered website building tools like DeepSite AI and BlackBox AI to create replica phishing pages mimicking Brazilian government agencies as part of a financially motivated campaign. The activity involves the creation of lookalike sites imitating Brazil’s State
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the cloak-and-dagger tactics seen in fiction, many real-world cyber breaches begin with something deceptively simple: a username and password. According to Verizon’s 2025 Data Breach Investigations Report, leaked credentials accounted for 22% of breaches
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly innocuous automation tools for social media, blogging, or messaging services to steal credentials from unsuspecting users and likely resell them on dark web forums like Russian Market. The activity is assessed to be active since at least March 2023, according to the software supply
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to impersonate popular cryptocurrency wallets and steal more than $1 million in digital assets. The published browser add-ons masquerade as MetaMask, TronLink, Exodus, and Rabby Wallet, among others, Koi Security researcher Tuval Admoni said. What makes the
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot TDS and Keitaro TDS to filter and redirect unsuspecting users to sketchy content. “The core of their operation is a sophisticated Malware-as-a-Service (MaaS) model, where infected systems are sold as initial access points to other cybercriminal organizations,” Silent Push
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write. But in 2025, that trust comes with a serious risk. Every few weeks, we’re seeing fresh headlines about malicious packages uploaded to the Python Package Index (PyPI)—many going undetected until after they’ve caused
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have discovered a set of 11 malicious Go packages that are designed to download additional payloads from remote servers and execute them on both Windows and Linux systems. “At runtime the code silently spawns a shell, pulls a second-stage payload from an interchangeable set of .icu and .tech command-and-control (C2) endpoints, and executes it in memory,” Socket security
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both a weapon and a shield. As AI rapidly changes how enterprises innovate, security teams are now tasked with a triple burden: Secure AI embedded in every part of the business. Use AI to defend faster and smarter. Fight AI-powered threats that execute in minutes—or seconds. Security
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶