Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations

In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats.

March 17, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: KTA080 (CLOP) Update CL0P has recently published files from victim organizations that were last revealed from the E-H listing around February 24, 2025. Some victim organizations were removed from the E-H listing as well as the H-W listing, likely due to negotiations with the threat actor group to refrain from sensitive data to be published. Additional victim companies have also been published outside of the E-H listing.

The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch

In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats grow in sophistication and frequency, understanding emerging trends, adopting advanced tools, and implementing proactive tactics are essential for organisations aiming to safeguard their digital assets. Traditionally, threat intelligence has focused on reactive measures, analysing known threats to mitigate potential damage.

Security Bulletin: Apache Camel Message Header Injection via Improper Filtering

In the days leading up to the publication of the Apache Camel Message Header Injection via Improper Filtering, now known as CVE-2025-27636, alarmist noise emerged from the wider cyber community, with Kevin Beaumont describing it as an “end of the world zero day” in Apache Camel, along with explicit details on how elements of this vulnerability worked.

March 10, 2025 Cyber Threat Intelligence Briefing

March 10, 2025 Cyber Threat Intelligence Briefing This week’s briefing covers: BLACK BASTA Affiliates Linked to CACTUS Ransomware Researchers have linked CACTUS ransomware tactics to former affiliates of BLACKBASTA, noting the use of similar tools and techniques. CACTUS employs the BackConnect (BC) module for persistent control over infected systems, allowing for data theft and remote command execution.

Fortifying Financial Services Cybersecurity with Threat Intelligence and Cybersecurity Automation

The World Economic Forum’s Global Cybersecurity Outlook 2025 Insight Report paints a bleak picture of what the year ahead holds for technology security teams worldwide. However, some industries are likely to be worse off than others.

Security Bulletin: Arbitrary Command Execution in Kibana

On Wednesday, March 5th, Kibana disclosed a security vulnerability with a Critical CVSS score of 9.9 impacting versions 8.15.0 through 8.17.2, with 8.17.3 being patched to fully remediate the vulnerability. The vulnerability, known as prototype pollution, revolves around the malicious crafting of file uploads and the sending HTTP requests leading to arbitrary code execution on the host machine.

Security Bulletin: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion

On March 4, 2025, Broadcom, which acquired VMware in 2023, released security updates to fix three actively exploited vulnerabilities in VMware ESXi, Workstation, and Fusion that could result in code execution and information disclosure. CVE-2025-22224 is a critical TOCTOU (Time-of-Check Time-of-Use) race condition vulnerability that leads to an out-of-bounds write, allowing an attacker with administrative privileges on a virtual machine to execute code as the VMX process on the host.

How Threat Intelligence Feeds Strengthen Your Cybersecurity Strategy

In today's increasingly connected world, cybersecurity has become a critical concern for organizations of all sizes. As businesses rely more on digital systems and networks, the risks posed by cybercriminals continue to grow. Organizations must be proactive in identifying and mitigating threats to safeguard their sensitive data, intellectual property, and customer trust. One of the most effective ways to bolster a cybersecurity strategy is by leveraging threat intelligence feeds. In this article, we'll explore how these feeds work, why they are essential, and how they can strengthen your overall cybersecurity strategy.

CYSIAM Announces Partnership with CrowdStrike to Strengthen Cyber Resilience in the UK Defence Supply Chain

CYSIAM aannounces partnership with CrowdStrike to strengthen cyber resilience across the UK Defence sector supply chain. Through this partnership, CYSIAM will equip defence organisations with advanced protection powered by the CrowdStrike Falcon cybersecurity platform, safeguarding critical national infrastructure and enhancing the nation's defence capabilities.