Stay informed with the latest trends and developments in cybersecurity.
Disclaimer: TenGuard Watch provides curated summaries of articles from trusted sources like The Hacker News, SecurityWeek, and BleepingComputer. For full content, visit the original publication by following the provided links.
Summary: Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST , likely targeting supporters of Iran's ongoing protests to conduct information theft and long-term espionage....
Impact: Malicious software campaign targeting users and organizations.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's p...
Impact: Cybersecurity development requiring attention and monitoring.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerabil...
Impact: Critical vulnerability requiring immediate attention and patching.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors ...
Impact: Critical vulnerability requiring immediate attention and patching.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compl...
Impact: Cybersecurity development requiring attention and monitoring.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according...
Impact: Active exploitation observed in the wild, requiring immediate defensive measures.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: The cyberattack disrupted information and booking systems and lasted for several hours.
Impact: Cyber attack campaign targeting organizations and individuals.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: The malware has been preinstalled on many devices but it has also been distributed through Google Play and other app stores.
Impact: Malicious software campaign targeting users and organizations.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: The Series A funding round, led by Bain Capital, brings the total raised by Cogent to $53 million.
Impact: Security vulnerability affecting systems and requiring patching.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: Novee researchers discovered 16 vulnerabilities in Foxit and Apryse PDF tools that could have been exploited via malicious documents or URLs.
Impact: Active exploitation observed in the wild, requiring immediate defensive measures.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: The vulnerability added to CISA’s KEV catalog affects ThreatSonar Anti-Ransomware and it was patched in 2024.
Impact: Active exploitation observed in the wild, requiring immediate defensive measures.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: Koi has developed an endpoint security solution that Palo Alto will use to enhance its products.
Impact: Cybersecurity development requiring attention and monitoring.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijackin...
Impact: Critical vulnerability requiring immediate attention and patching.
Source: BleepingComputer - Read Full Article
Read Full ArticleSummary: AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.
Impact: Malicious software campaign targeting users and organizations.
Source: BleepingComputer - Read Full Article
Read Full ArticleSummary: Attackers are doubling down on malicious browser extensions as their method of choice, stealing data, intercepting cookies and tokens, logging keystrokes, and more.
Impact: Cyber attack campaign targeting organizations and individuals.
Source: BleepingComputer - Read Full Article
Read Full ArticleSummary: If you've been waiting for a recognizable audio brand to hit a realistic price point, this is it. The new, open-box Sony WF-C710N Truly Wireless Noise-Canceling Earbuds are now just $69.99 (MSRP $129....
Impact: Cybersecurity development requiring attention and monitoring.
Source: BleepingComputer - Read Full Article
Read Full Article