Cybersecurity News

Understanding the Cookie-Bite MFA Bypass Risk
The Cookie-Bite attack is an advanced evolution of Pass-the-Cookie exploits. This tactic bypasses Multi-Factor Authentication (MFA) by leveraging stolen authentication cookies—such as Azure Entra ID’s ESTSAUTH and ESTSAUTHPERSISTENT—to impersonate users ...

The State of AI in Cybersecurity 2025: What’s Working, What’s Lagging, and Why It Matters Now More Than Ever
This second annual study offers a deeper look at how organizations are using AI to detect and respond to attacks faster, where it’s making the biggest impact, and what’s holding adoption back ...

How China’s Admission Reinforces the Urgency for AI-Powered, Preemptive Cybersecurity
In December, a senior Chinese cyber official offered what U.S. representatives took as tacit admission: China was behind a series of cyber intrusions targeting U.S. critical infrastructure. As reported by The Wall ...

MixMode Releases 2025 State of AI in Cybersecurity Report
MixMode, a leader in AI-powered cybersecurity, today released State of AI in Cybersecurity Report 2025, its second annual report, independently conducted by the Ponemon Institute. Based on a survey of 685 U.S ...

Volt Typhoon, Salt Typhoon & APT41: This is No Longer a DrillÂ
New threat intelligence confirms what many infrastructure leaders have long feared: Chinese state-sponsored threat groups are not only capable of infiltrating U.S. critical systems—they already have ...

Why the 2025 PyPI Attack Signals a New Era in Cloud Risk
The 2025 PyPI supply chain attack is a stark reminder of just how vulnerable cloud ecosystems remain to sophisticated, stealthy, and evolving threats ...

Threat Research Report: Web Browsers as an Overlooked Risk in Cybersecurity
Web browsers have evolved from passive document viewers into complex platforms essential for cloud-based work. But this transformation has also made them a prime target for cyber threats, leaving enterprises and government ...

Securing OAuth Authentication Risks with AI-Driven Monitoring
As organizations continue to integrate cloud-based services and third-party applications, OAuth authentication has become a cornerstone of modern security frameworks. However, recent cybersecurity incidents highlight a growing concern: OAuth-based vulnerabilities remain an ...

Why DeepSeek’s Low Price Could Cost You Everything
While its capabilities are impressive, this development raises significant concerns about the hidden costs and potential security risks associated with its widespread adoption ...
Best of 2024: Cisco Vulnerability: CISA Alerts Of Smart Install Exploits
In light of recent cybercrime incidents, the United States (US) Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert pertaining to a Cisco vulnerability. As per recent reports, the Cisco vulnerability ...