Skip to main content
Microsoft Azure Withstands Largest Ever DDoS Attack (15.7 Tbps)

Azure Withstands Largest Cloud-Based DDoS Assault Ever

Azure stopped a record 15.7 Tbps DDoS attack from the Aisuru botnet. No downtime reported, proving the need for automated cloud defences.

Gainsight-Salesforce Integration Breach Exposes Data of 1,000 Firms

Gainsight–Salesforce Apps Breach Sees Data Stolen

ShinyHunters breached Gainsight apps to access Salesforce data of 1,000 firms. Tokens revoked. Review third-party SaaS integrations now.

Garden Finance Loses $11M in DeFi Solver Exploit

Company Loses US$ 11 Million After Solver Exploit Exposes Risks in DeFi Bridges

DeFi bridge Garden Finance loses $11m after a solver exploit. Experts question system autonomy as the firm offers a bounty for return of funds.

China-Linked Hackers Exploit Cisco Zero-Day Vulnerabilities

China-Linked Hackers Target Cisco Firewalls in Global Campaign

China-linked Storm-1849 targets Cisco ASA firewalls via zero-days. Attackers implant persistent malware. Immediate patching and forensic audit needed.

Europol Dismantles €600M Crypto-Fraud Ring in Europe

Major Crypto-Fraud Ring Uncovered by Europol

Europol and Eurojust dismantled a €600m crypto-fraud ring. The October 2025 operation led to 9 arrests and seizure of criminal assets across Europe.

Curly COMrades Group Hides Malware in Virtual Machines

Hackers Using Hidden Virtual Machines for Stealth Malware

Russian group Curly COMrades hides malware in Alpine Linux VMs on compromised hosts. This stealth technique evades standard EDR tools.

Microsoft Teams Flaws Allow Message Tampering & Impersonation (2025)

Flaws in Microsoft Teams Open Door for Attackers

New MS Teams flaws allow attackers to rewrite chats and spoof IDs. Patched Oct 2025—ensure all clients are updated to prevent social engineering.

Why Hackers Love Christmas as much as the rest of Us

Why Hackers Love Christmas as much as the rest of Us

The Christmas trading period brings huge opportunity, but it also brings heightened cyber risk.

Changing Your MDR Provider – Your Essential Checklist

Changing Your MDR Provider – Your Essential Checklist

This checklist is designed to make changing your managed detection and response (MDR) provider a smooth, secure, and efficient process: turning a potential disruption into a confident, well-managed upgrade.

What if Your Security Service Provider Can No Longer Support You?

What if Your Security Service Provider Can No Longer Support You?

Operational resilience isn’t tested when everything works - it’s tested the moment your security service provider can no longer support you.