Illustration - Cyber Resilience (Credit: iuriimotov) Business Shield The 24-Hour Recovery Myth: Why CISOs are Prioritizing Resilience New comprehensive research from Absolute Security exposes a "recovery reality gap." With 0% of organizations achieving sub-24-hour recovery, the industry is shifting focus from detecting threats to the speed of restoring business operations. Editorial Team • 2 min read
News 2025 Cyber Year in Review: AI Attacks, Data Breaches & Takedowns From React2Shell's perfect CVSS 10.0 score to the first autonomous AI cyberattack, 2025 pushed cybersecurity to its limits. This comprehensive analysis covers the top 10 breaches, critical vulnerabilities, why ransomware economics is slowly collapsing and big LEA operations against cybercriminals. Editorial Team • 17 min read
Photo by Daniil Komov Expert Decode The Critical Role of Human Expertise in Securing Machine-Generated Code Automated code generation introduces critical security gaps. Learn why human expertise remains essential for identifying vulnerabilities in machine-written code. Editorial Team • 6 min read
Photo: Security.land (Edit: AI) Cyber Watch MongoBleed Alert: CVE-2025-14847 Exploited in the Wild Dubbed "MongoBleed," CVE-2025-14847 allows unauthenticated attackers to exfiltrate sensitive data from MongoDB heap memory. With 87,000 instances exposed, active exploitation is now confirmed. Editorial Team • 3 min read
Illustration (Credit: Security.land) Threat Horizon Npm Registry Weaponized in Spearphishing Campaign Against Critical Infrastructure A five-month spearphishing operation has transformed the npm registry into a durable hosting layer for AiTM credential theft, specifically targeting sales teams in the manufacturing and healthcare industries. Editorial Team • 3 min read
Photo by Kenjiro Yagi Breach Breakdown Nissan Japan Data Breach Affects 21,000 Fukuoka Customers Nissan Motor Co. confirms a data breach affecting 21,000 customers in Japan following a security incident at third-party vendor Red Hat. No financial data was stolen. Editorial Team • 4 min read
Photo: Vadim Artyukhin Cyber Watch Crypto Theft Campaign Exploits NuGet Packages for Months Security researchers uncovered 14 malicious NuGet packages that impersonated legitimate cryptocurrency tools to steal funds and OAuth tokens. The campaign ran undetected from July through October 2025, using social engineering tactics. Editorial Team • 4 min read
Photo by Pankaj Patel Cyber Watch WhatsApp-Stealing Malware Lurked in NPM Package With 56,000 Downloads Researchers at Koi Security have uncovered a malicious npm package that stole WhatsApp credentials and messages while functioning perfectly as a legitimate API library. The lotusbail package accumulated over 56,000 downloads in six months. Editorial Team • 3 min read
Illustration - Hacking group with Iran flag GeoSphere Iranian Hacking Group Puts $30,000 Bounties on Israeli Defense Engineers The Handala hacking group claims to have exposed 14 Israeli engineers working on drone programs, offering $30,000 rewards for each. The threats follow attacks on politicians including Bennett, whose Telegram was compromised. Israeli security sources haven't verified the claims. Editorial Team • 3 min read
Illustration (Credit: Security.land) Threat Horizon Cybercriminals Impersonate Trend Micro in Multi-Sector Attack A sophisticated threat actor with possible links to Russian hybrid-threat groups impersonated Trend Micro security advisories to target defense contractors, energy companies, and cybersecurity firms. The attack chain was stopped before final payload deployment. Editorial Team • 5 min read
Watchguard Logo (Photo: Watchguard, Edit: Security.land) Cyber Watch Inside CVE-2025-14733: The Unauthenticated RCE Hitting WatchGuard Firewalls Analysis of CVE-2025-14733, a critical WatchGuard Firebox vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations. Editorial Team • 3 min read
Illustration of Threat Actor BlindEagle with Colombia flag in background Threat Horizon BlindEagle APT Deploys Dual Remote Access Trojans Against Colombian Government Infrastructure Zscaler documents BlindEagle APT's attack on Colombian government using steganography and dual RAT deployment in September 2025. Editorial Team • 5 min read
Red Hat Red Hat Strengthens AI Security Portfolio with Chatterbox Labs Acquisition Red Hat acquires Chatterbox Labs to integrate model-agnostic AI safety testing and guardrails into enterprise AI platform. Editorial Team • 4 min read
SAP Logo (Photo: SAP, Edit: Security.land) Cyber Watch SAP December Patches Address 15 Flaws Including Solution Manager RCE SAP's December 2025 patches fix 15 vulnerabilities including critical 9.9 CVSS Solution Manager code injection and Tomcat flaws in Commerce Cloud. Editorial Team • 9 min read
Photo: Growtika Cyber Watch Active Exploitation of CVE-2025-59718 Raises Urgency for Fortinet Users Active exploitation of a Fortinet authentication bypass highlights the need to review SSO settings and apply updates promptly. Editorial Team • 3 min read
Photo: Glen Carrie Skills Lab Weaponizing Shodan: From Adversarial Recon to Continuous Defense Learn how to weaponize dorks for red teaming or automate perimeter defense. Editorial Team • 3 min read