China-Backed Hackers Abuse Insecure Cisco Configurations in Cyber Attacks

 


China-Linked Hackers Exploit Misconfigured Cisco Security Products to Deploy Backdoors

China-linked threat actors have been actively exploiting misconfigured Cisco security products to gain persistent access to targeted networks, according to new findings from Cisco. The campaign has been ongoing for several weeks and highlights how insecure configuration choices—not software flaws alone—can expose critical infrastructure to advanced cyber threats.

Google to Discontinue Dark Web Monitoring Tool by January 2026


Based on the official Google support page referenced, the Dark Web Report feature is being discontinued due to changes in the dark web landscape and resource allocation. The monitoring functionality will cease on January 15  2026  and all associated data will be permanently lost. This decision aligns with Google's strategic shift away from certain security features.

 

Microsoft Teams Introduces Call Flagging to Combat Malicious Callers

 


Microsoft Teams Introduces New Feature to Flag Malicious Calls: A Major Boost to Communication Security

Microsoft is preparing to roll out a powerful new security enhancement to its Teams platform, aimed at combating the growing threat of spam, phishing, and malicious calls targeting organizations. The upcoming feature, “Report a Suspicious Call,” will give users the ability to directly flag questionable calls — adding an extra layer of protection to everyday communication.

AWS IAM Eventual Consistency: The Overlooked Persistence Technique

 


Exploiting AWS IAM Eventual Consistency: The Persistence Risk Every Cloud Defender Must Understand

AWS Identity and Access Management (IAM) is often perceived as a strongly consistent and immediate-response system. However, like many globally distributed services, it actually operates on an eventual consistency model. While this design enables scalability across regions, it also introduces brief but dangerous windows that attackers can exploit to maintain persistence — even after defenders believe they have removed access.

Major Security Flaw Exposed 3.5 Billion WhatsApp Phone Numbers



WhatsApp had a massive security flaw that put phone numbers of 3.5 billion users at risk


A significant security vulnerability has recently been uncovered in WhatsApp's contact discovery feature, allowing researchers to scrape and identify a massive database of users. This incident highlights a major oversight in the platform's design and rate-limiting protocols.

RBI Mandates '.bank.in': Securing India's Digital Banking Ecosystem

 


RBI Mandates '.bank.in': A New Era for Secure Digital Banking

Key Takeaways:

  • The Reserve Bank of India (RBI) has made the '.bank.in' domain mandatory for all licensed banks in India.

  • This exclusive domain acts as a critical security filter to prevent banking fraud, especially phishing.

  • Only RBI-regulated institutions can register for the '.bank.in' domain, guaranteeing website authenticity.

  • Customers must now verify the URL ending to ensure they are on a legitimate bank portal.


VanHelsing Unleashed: The RaaS That Targets Windows, Linux, BSD, ARM and VMware ESXi

 


VanHelsing RaaS: a cross-platform ransomware that weaponizes affiliates to hit Windows, Linux, BSD, ARM and ESXi

VanHelsing has emerged as a sophisticated ransomware-as-a-service (RaaS) operation that changes the rules for cross-platform attackers. First observed on March 7, 2025, VanHelsing provides a fully packaged service to criminal affiliates: a $5,000 deposit to join, an 80% cut of ransom payments for affiliates, and a user-friendly control panel to orchestrate attacks across heterogeneous environments.

China-Backed Hackers Abuse Insecure Cisco Configurations in Cyber Attacks

  China-Linked Hackers Exploit Misconfigured Cisco Security Products to Deploy Backdoors China-linked threat actors have been actively expl...