Why zero trust is never 'done' and is an ever-evolving process

Why zero trust is never 'done' and is an ever-evolving process

Picture this scenario: Six months after celebrating their “zero trust transformation,” a financial services firm gets hit with a devastating breach. Attackers waltzed through a supply chain vulnerability in a third-party API, bypassing all those carefully configured identity controls . The firm ticked every checkbox and met every requirement – yet here they are, scrambling … Ler mais

Healthcare Services Group data breach impacts 624,000 people

Picus Blue Report 2025

The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year. The healthcare services provider stated that it detected unauthorized access to its network on October 7, 2024, and subsequently discovered that the intrusion had begun on September 27. The investigation that followed … Ler mais

A vulnerabilidade do curador da NVIDIA NEMO AI permite a execução do código e a escalada de privilégios

NVIDIA NeMo AI Curator Vulnerability Allows Code Execution and Privilege Escalation

A NVIDIA lançou um boletim de segurança para o Curador Nemo Nvidia®, abordando uma vulnerabilidade de alta severidade (CVE-2025-23307) Isso afeta todas as versões anteriores do software curador. A falha, enraizada no manuseio inadequado de arquivos fornecidos pelo usuário, permite que um arquivo maliciosamente criado seja processado pelo Curador Nemo, levando à injeção de código … Ler mais

TAG-144: atores atacando entidades governamentais com novas táticas, técnicas e procedimentos

TAG-144: Actors Attacking Government Entities With New Tactics, Techniques, and Procedures

O ator de ameaças conhecido como TAG-144, também chamado de águia cega ou APT-C-36, foi vinculado a cinco aglomerados de atividades distintos que operam de maio de 2024 a julho de 2025, direcionando principalmente as entidades governamentais colombianas nos níveis locais, municipais e federais. Este grupo de ameaças cibernéticas, ativo desde pelo menos 2018, emprega … Ler mais

Multiple Vulnerabilities in Commvault Backup & Recovery Could Allow for Remote Code Execution

MS-ISAC ADVISORY NUMBER: 2025-074 DATE(S) ISSUED: 08/20/2025 OVERVIEW: Multiple vulnerabilities have been discovered in Commvault Backup & Recovery, which when chained together, could allow for remote code execution. Commvault Backup & Recovery is a comprehensive data protection solution that offers a range of services for safeguarding data across various environments, including on-premises, cloud, and hybrid … Ler mais

Citrix Patches Three Zero Days as One Sees Active Exploitation

Citrix Patches Three Zero Days as One Sees Active Exploitation

Citrix has released patches for three zero-day vulnerabilities in NetScaler ADC and Gateway, one of which was already being exploited by attackers. The flaws, tracked as CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424, are two memory overflow vulnerabilities and an improper access control on the NetScaler Management Interface. They are all considered critical vulnerabilities, with severity score (CVSS) … Ler mais

We Are Still Unable to Secure LLMs from Malicious Inputs – Schneier on Security

Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious … Ler mais

A Vulnerability in Apple Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER: 2025-075 DATE(S) ISSUED: 08/26/2025 OVERVIEW: A vulnerability has been discovered in Apple products which could allow for arbitrary code execution. Successful exploitation could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, … Ler mais

ENISA to Coordinate €36m EU-Wide Incident Response Scheme

ENISA to Coordinate €36m EU-Wide Incident Response Scheme

The EU’s security agency is being given €36m ($42m) to handle incident response for major cyber-attacks targeting the bloc. ENISA yesterday announced the signing of a “contribution agreement” which will see it operate the EU Cybersecurity Reserve. This virtual pool of incident response services from trusted private sector providers was established by the EU Cyber … Ler mais

New Data Theft Campaign Targets Salesforce via Salesloft App

New Data Theft Campaign Targets Salesforce via Salesloft App

Salesforce customers have again been targeted in a “widespread data theft campaign,” this time via compromised OAuth tokens associated with thethird-party Salesloft Drift application. Salesloft Drift integrates with Salesforce to help sales and marketing teams collaborate on projects. Salesloft issued a security alert on August 20 revealing it had detected a security issue and “proactively … Ler mais