Delivering Cybersecurity at the Speed of War with CSRMC by DoW

The Department of War (DoW) announces the implementation of a groundbreaking Cybersecurity Risk Management Construct (CSRMC), a transformative framework to deliver real-time cyber defense at operational speed. This five-phase construct ensures a hardened, verifiable, continuously monitored, and actively defended environment to ensure that U.S. warfighters maintain technological superiority against rapidly evolving and emerging cyber threats. The…

Read More

US Secret Service dismantle Threat on Telecom network

The seized devices, described as “SIM servers,” were linked to a broader network believed to be operated by or connected to “nation-state” actors. US Secret Service dismantles telecom network with 300 SIM servers and 100,000 SIM cards near the UN General Assembly. Devices could have disabled mobile towers, blocked emergency dispatch, and texted the entire…

Read More

NETSCOUT HELPS REDUCE FIBER-TO-THE-HOME COSTS AND CUSTOMER CHURN

NetScout announced its solutions to support cable providers and multiple service operators (MSOs) in improving their ability to deliver an exceptional customer experience while reducing costs.   Competition is driving the development of new methods for delivering content more efficiently and effectively. Streaming entertainment, gaming and interactive content, and home automation continue to drive demand…

Read More

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware

Cyber threat intelligence firm Prodaft provided details on Subtle Snail (UNC1549) is an Iran-nexus espionage group linked to Unyielding Wasp (Tortoiseshell), which is part of the Eclipsed Wasp (Charming Kitten) network. The group has been active since at least June 2022 and recently shifted focus to European telecom, aerospace, and defense organizations. The group’s primary motivation involves infiltrating…

Read More

Cyberattack disrupts flights at London, Brussels & other European airports

Cyberattack targeting a service provider for check-in and boarding systems caused major disruptions at several prominent European airports, including London’s Heathrow, Brussels and Berlin, on Saturday. The incident resulted in significant delays and numerous flight cancellations, impacting thousands of passengers across the continent. The attack caused widespread flight delays and cancellations. Heathrow warned passengers of…

Read More

Securonix is transforming SecOps with Agentic AI through intelligent agents; Dipesh kaura, Securonix

Recently Securitydive spoke to Dipesh Kaura serves as the Country Director for India & SAARC at Securonix. As threat landscape expand so are offerings to secure enterprise. With AI poised as an integral part of cyber threats, organizations have shifted their investments following this trend, with a focus on AI-based defenses against cyberattacks. The demand…

Read More

UAE Cyber Security Council warns 1.4 billion accounts hacked monthly worldwide

The UAE Cybersecurity Council has warned the public against the dangers of neglecting personal digital footprints, cautioning that every login, post, or interaction online leaves behind a trail that can be exploited by hackers or untrustworthy applications. In a statement carried by the Emirates News Agency (WAM), the council noted that more than 1.4 billion…

Read More

FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration

The Federal Bureau of Investigation (FBI) has released a flash alert detailing the activities of two cybercriminal groups, UNC6040 & UNC6395, that are actively compromising Salesforce environments to steal data for extortion purposes. The advisory, published by the FBI on September 12, 2025, provides indicators of compromise (IOCs) and defensive measures to help organizations protect…

Read More

Cyber attackers use images & built-in tools to bypass defences

Research from HP Wolf Security has found that cyber attackers are continually refining established tactics in order to evade security measures and deceive users. Living-off-the-land tactics The HP Threat Insights Report describes an increasing trend in the use of “living-off-the-land” (LOTL) techniques, whereby cybercriminals utilise legitimate tools and features within the operating system to carry…

Read More