Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

Cybercriminals have been increasingly turning to “residential proxy” services over the past two to three years to disguise malicious web traffic as everyday online activity, according to research presented at the Sleuthcon cybercrime conference. The sh…

Massive US/Russian Tech Giant Elections Spy Operation Exposed by EU

European security researchers have exposed a cross-platform spy scheme by US and Russian tech companies to secretly spy on billions of Android users worldwide. In the disclosure released this week called “Covert Web-to-App Tracking via Localhost …

Attackers exploit Fortinet flaws to deploy Qilin ransomware

Qilin ransomware now exploits Fortinet vulnerabilities to achieve remote code execution on impacted devices. Threat intelligence firm PRODAFT warned that Qilin ransomware (aka Phantom Mantis) group targeted multiple organizations between May and June 2025 by exploiting multiple FortiGate vulnerabilities, including CVE-2024-21762, and CVE-2024-55591. “Phantom Mantis recently launched a coordinated intrusion campaign targeting multiple organizations between […]

New America’s Maginot Line of Military Deception

Why a Think Tank Report on Deception Misses the Point—And Makes States More Vulnerable I was excited to watch the presentation yesterday of a recent New America report on “The Future of Deception in War“. It seemed through the talk, however…

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Google Chromium V8 vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium V8 Out-of-Bounds Read and Write Vulnerability, tracked as CVE-2025-5419, to its Known Exploited Vulnerabilities (KEV) catalog. This week, Google released out-of-band updates to address three vulnerabilities […]