Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What To Know About the UNFI Cyber Attack

On June 9, 2025, United Natural Foods, Inc. (UNFI) – a major organic food distributor and the main grocery supplier for Whole Foods Market – reported a cyber attack. UNFI first discovered unauthorized activity in its IT systems on June 5 and immediately took some systems offline. At the time of this writing, the investigation is ongoing as officials assess the full impact of the breach.

OpenAI Report Describes AI-Assisted Social Engineering Attacks

OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in social engineering attacks and influence operations. In one case, the company banned ChatGPT accounts that were likely being used in North Korean attempts to fraudulently obtain jobs at US companies. “Similar to the threat actors we disrupted and wrote about in February, the latest campaigns attempted to use AI at each step of the employment process.

Stealth Cyberattacks at Night: How Librarian Ghouls Are Exploiting Trusted Tools to Evade Detection

The cyber threat landscape is rapidly evolving. Among the most recent and concerning trends is the use of stealth attacks that bypass traditional defenses by abusing legitimate tools. One such campaign, led by a group called Librarian Ghouls, is targeting organizations across Russia with cleverly disguised phishing emails, cryptominers, and remote-access software—often operating undetected in the middle of the night.

Warning: Crooks Are Using Vishing Attacks to Compromise Salesforce Instances

A criminal threat actor tracked as “UNC6040” is using voice phishing (vishing) attacks to compromise organizations’ Salesforce instances, according to researchers at Google’s Threat Intelligence Group. After gaining access, the attackers exfiltrate the victim’s data and hold it for ransom.

Is Your Rented Server Safe Enough?

We get it-you've rented a server. Whether it's for your business, your app, your game, or just that brilliant startup idea you're nurturing, renting a server feels like leveling up. It's exciting, empowering... and terrifying. Because the moment that server is online, it's visible to the entire internet. Including the bad guys. Hackers, bots, DDoS armies, and other digital troublemakers don't care that it's "just a test project." If it's online, it's fair game. So, how do you protect it?

Client-Side Exploitation Attack Path

Client-side exploit delivery methods like malicious documents or browser-based attacks are among the most common ways adversaries gain initial access. But without visibility into these entry points, many attack paths go undetected. This demo shows how Falcon Exposure Management identifies and maps attack paths that begin with client-side exploitation. By combining exploit visibility with real network context and asset criticality, security teams can uncover hidden lateral movement risks and take action fast.

How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks

Internet-facing assets are targeted for many reasons, such as to establish persistence, evade defensive capabilities, and access sensitive networks. According to the search engine Shodan, approximately 1,600 VMware vSphere instances are directly accessible via the internet, representing a significant attack surface.

The Rising Tide: Understanding the Surge in Cyber Attacks in India

Over the past year, India witnessed a steep rise in cyberattacks. While news focused on big-ticket data breaches and mainstream ransomware attacks, it ignored how the overall threat landscape has become more sophisticated and ingrained. India detected over 369 million malware events between October 2023 and September 2024, at a rate of 702 potential threats per minute on average.

The Most Concerning CyberSecurity Statistics From Recent Data

If you've been paying attention to cybersecurity lately, it's hard not to notice just how fast the landscape is shifting. Threats that were once rare a few years ago are now occurring weekly-sometimes daily-and they're targeting larger targets with more severe consequences. It's not just about data theft anymore. Whole systems are being locked up, leaked, or dismantled in hours. The most recent statistics show just how aggressive and sophisticated these attacks have become, and 2025 is shaping up to be a pivotal year for digital security.