Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When It Comes To Website Takedowns, Speed Is Everything (well nearly ;))

Lookalike domains – meaning domains where threat actors host content designed to impersonate your business or brand – can be gravely harmful. “Look-alikes prey on users’ inattention to verifying legitimate websites, and sometimes rely on human mistakes, such as entering a typo in a URL, to capture victims,” as Dark Reading notes. The good news, however, is that lookalike domains can take some time to roll out fully.

Top Checkmarx Alternatives for Application Security in 2025

Checkmarx is a popular SAST, DAST, and SCA provider that helps organizations detect and fix vulnerabilities and ensure application security. Its robust testing capabilities make it a go-to choice for many enterprises looking to integrate security into their DevSecOps pipeline. However, like all tools, Checkmarx has certain limitations. Some users find it expensive and complex to set up, while others report long scan times and occasional false positives, which slow down development workflows.

SafeBreach Coverage for US CERT AA25-071A (Medusa Ransomware)

On March 12, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), issued a joint Cybersecurity Advisory (CSA) titled “#StopRansomware: Medusa Ransomware” (Alert Code: AA25-071A).

Detecting CVE-2025-22224 with Falco

The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code execution attack. The attackers who gain administrative access to a compromised VM can exploit this flaw to execute arbitrary code on the hypervisor, gaining full control over all hosted VMs and networked assets. Broadcom released emergency patches for ESXi and Workstation products to remediate the flaw.

X-Ray Specs: A Look Inside Trading Card Scalper Innovation

The perfect conditions for both pre-planned and opportunistic scalper attacks are quite simple: limited availability and high demand. The trading card culture – think everything from Pokémon and Magic the Gathering to Panini or Topps football and baseball cards – fuels this fire, with first print editions and special editions held to a higher value than reprints.

Protect Yourself: Social Engineering Fuels SIM Swapping Attacks

Group-IB has published a report on SIM swapping attacks, finding that attackers continue to use social engineering to bypass technical security measures. SIM swapping is a technique in which an attacker takes over a victim’s phone number, which enables them to access the victim’s accounts. This involves tricking the telecom operator into reassigning the victim’s phone number to a SIM card controlled by the attacker.

Widespread Fake CAPTCHA Campaign Delivering Malware

Arctic Wolf has recently observed a campaign in which threat actors are compromising widely used websites across various industries and embedding a fake CAPTCHA challenge. When victims visit the site, they are presented with the CAPTCHA challenge or redirected to a site that provides instructions, triggering PowerShell code execution and ultimately leading to the loading of information stealer malware.