Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform recently received a major update that reworks all the core mechanics. Passwork 7 introduces significant changes to how credentials are organized, accessed, and managed, reflecting […]

Continue Reading

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

Oct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector with malware families such as FoalShell and StallionRAT. Cybersecurity vendor BI.ZONE is tracking the activity under the moniker Cavalry Werewolf. It’s also assessed to have commonalities with […]

Continue Reading

Amazon Sale 2025: Best Deals on Smart Home Devices

The Amazon Great Indian Festival sale is underway, and it offers lucrative discounts on a wide range of products across categories. Popular smart home devices, including smart bulbs, door locks, switches, and Alexa-enabled devices, are available for considerably lower prices than their usual market rates. Here are the best deals on smart home devices during […]

Continue Reading

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2025-4008 (CVSS score: 8.7), is a case of command injection in the Meteobridge web interface that […]

Continue Reading

AI’s Role in PR Is Skyrocketing, With 25% of Press Releases Now Machine-Generated, Study Finds

Artificial intelligence (AI) is steadily weaving into different aspects of society, with fresh applications emerging regularly. A new study has revealed that over 25 percent of external corporate communication and press releases were either written with AI chatbots or significantly edited using them. The highest jump in AI usage was seen in technology and business […]

Continue Reading

Silicon Valley’s new defense tech ‘neoprimes’ are pulling billions in funding to challenge legacy giants

Guvendemir | E+ | Getty Images A wave of defense tech startups in Silicon Valley is drawing billions in funding and reshaping America’s national security. Anduril Industries, recently valued at $30.5 billion following its latest funding round, is among the so-called “neoprimes” — companies challenging the dominance of legacy contractors, dubbed “primes,” such as Lockheed Martin, Northrop […]

Continue Reading

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor. “Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries — especially in Pakistan – using […]

Continue Reading

Perplexity AI rolls out Comet browser for free worldwide

Aravind Srinivas, chief executive officer Perplexity AI, during a news conference at the SK Telecom Co. headquarters in Seoul, South Korea, on Wednesday, Sept.4, 2024. SeongJoon Cho | Bloomberg | Getty Images Perplexity AI on Thursday announced that its artificial-intelligence-powered web browser Comet is available worldwide, and will be free to users. The Comet browser […]

Continue Reading

Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of […]

Continue Reading