FIRESTARTER Backdoor on Cisco ASA: New APT Campaign Targets Network Perimeter Devices

Cisco router showing connected Ethernet cables with glowing indicators.

In September 2025, a U.S. civilian federal agency became the victim of a highly targeted network perimeter attack involving a compromised Cisco Firepower firewall running Adaptive Security Appliance (ASA) software. According to a joint advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (NCSC), the incident centered … Read more

Europol’s Operation PowerOFF Cracks Down on DDoS-for-Hire Services

2e8541e8 07b4 49ba ad92 f3e893365d49 1

Law enforcement agencies from 21 countries have taken coordinated action against the global market for DDoS-for-hire services, seizing 53 domains, arresting four alleged operators of illegal platforms and issuing more than 75,000 warnings to users of so‑called booter and stresser services. This new phase of Operation PowerOFF, led by Europol, marks one of the most … Read more

Google Deploys Gemini AI to Block Malvertising and Billions of Scam Ads

Google headquarters exterior with people walking by and lush landscaping.

The online advertising ecosystem is entering a new phase of escalation. As threat actors increasingly rely on generative AI to mass‑produce deceptive and malicious ads, Google is responding with its own large AI models. According to the company’s latest Ads Safety report for 2025, the deployment of Gemini has led to record‑level disruption of scam … Read more

KelpDAO rsETH Hack: $290M Cross-Chain Attack Highlights Critical DeFi Weaknesses

Futuristic landscape split between technological innovation and cyber warfare.

A sophisticated cross-chain attack against DeFi protocol KelpDAO has led to the theft of approximately $290 million in rsETH tokens, making it one of the largest liquid restaking exploits to date. The incident, detected on 18 April 2026, disrupted major lending protocols including Aave, Compound and Euler and has raised renewed concerns about the security … Read more

NIST Overhauls NVD: What “Not Scheduled” CVEs Mean for Vulnerability Management in 2026

NIST presentation on cybersecurity trends and vulnerability management strategies.

The U.S. National Institute of Standards and Technology (NIST) has announced a fundamental shift in how the National Vulnerability Database (NVD) will operate. Starting in April 2026, NVD will provide full analytical “enrichment” only for prioritized CVE records, while all other vulnerabilities will remain in the database with minimal data and a new “Not Scheduled” … Read more

Spain Dismantles Tu Manga Online: Inside the Cybersecurity Risks of Pirate Manga Platforms

Two officers investigate a computer setup in a room, examining a clock.

Spanish law enforcement has carried out a large-scale operation against online piracy, shutting down Tu Manga Online (TMO), also known as ZonaTMO—one of the most visited Spanish-language pirate manga platforms. Operating since 2014 and attracting millions of unique users each month, the site has been taken offline, and four individuals allegedly linked to the project … Read more

Lotus Wiper: Destructive Cyberattacks Hit Venezuela’s Energy and Utilities Sector

Computer screen displaying cyberattack details on Venezuelan utilities sector.

A wave of destructive cyberattacks against Venezuela’s energy and utilities sector in late 2025 and early 2026 has been linked to a previously unknown data-wiping tool dubbed Lotus Wiper. According to research by Kaspersky, this malware does not encrypt data or demand ransom. Instead, it is engineered to permanently destroy systems, pointing to a non-financial, … Read more

IPv8 IETF Draft: What the New Internet Protocol Proposal Means for Cybersecurity

Surreal scene featuring a figure at a computer in a digital landscape about IPv8.

A new Internet Protocol Version 8 (IPv8) Internet-Draft published on the Internet Engineering Task Force (IETF) website has triggered active discussion in the networking and cybersecurity communities. The draft proposes a shift in addressing format and network architecture compared with IPv4 and IPv6, while early analysis suggests that substantial portions of the text were likely … Read more

Critical Model Context Protocol (MCP) Flaw Enables Remote Code Execution in LLM Tooling Ecosystem

Close-up of a hand typing a command on an old computer terminal with colorful display.

Security researchers have identified a critical architectural flaw in the Model Context Protocol (MCP), a standard used to connect large language models (LLMs) to external tools and services. The weakness, rooted in the official Anthropic MCP SDK, can be exploited for remote code execution (RCE), creating a systemic risk across the AI and LLM supply … Read more