When it comes to top cybersecurity threats in September 2025, we have to understand that as businesses continue their digital transformation journey, the cybersecurity landscape is evolving at …
CSC News
-
-
News & Resources
Russian Energy Sector Cyberattacks: Kazakhstan Energy Sector Hit by Noisy Bear Cyberattack
by CSC Newsby CSC News 1 minutes readCritical Russian energy sector cyberattacks have hit Kazakhstan. This new cybersecurity threat has emerged targeting Kazakhstan’s critical energy infrastructure. Russian state-sponsored hacking group Noisy Bear has launched sophisticated …
-
News & Resources
Nx Supply Chain Breach Exposes Private Code Repositories
by CSC Newsby CSC News 2 minutes readA major security incident has rocked the developer community as over 6,700 private code repositories were inadvertently exposed in a supply chain attack targeting Nx, a popular open-source …
-
News & Resources
Linux Malware Exploits Malicious RAR Filenames, Evades Antivirus
by CSC Newsby CSC News 5 minutes readSecurity teams are warning about a new wave of attacks that deliver Linux malware via malicious PyPI packages. The campaign abuses the trust that developers place in open …
-
News & Resources
Netskope IPO filing reveals revenue surge in US
by CSC Newsby CSC News 5 minutes readInvestors and security leaders alike are paying close attention as a leading cloud security company releases fresh details ahead of a potential stock market debut in the United …
-
News & Resources
Microsoft Cybersecurity Restrictions: Microsoft Limits China’s Access to Security Vulnerability Data
by CSC Newsby CSC News 2 minutes readMicrosoft Cybersecurity Restrictions: Microsoft’s decision to restrict Chinese companies’ access to critical vulnerability data marks a significant shift in cybersecurity information sharing between the United States and China. …
-
Vulnerabilities & ExploitsNews & Resources
Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack
by CSC Newsby CSC News 2 minutes readApple has confirmed that an ‘extremely sophisticated’ Apple USB Restricted Mode exploit has been used in targeted attacks, potentially putting iPhone and iPad users at risk. Apple Issues …
-
Vulnerabilities & ExploitsNews & Resources
CISA Adds New Exploited jQuery Vulnerability to KEV Catalog
by CSC Newsby CSC News 2 minutes readThe CISA known exploited vulnerabilities update has just included a critical jQuery vulnerability cross-site scripting (XSS) flaw, tracked as CVE-2020-11023, to its catalog. This latest addition highlights the …
-
Data BreachesNews & Resources
Millions Impacted by PowerSchool Data Breach
by CSC Newsby CSC News 2 minutes readA recent PowerSchool data breach has impacted millions of students and staff, raising serious concerns about data privacy and security in schools across the United States. PowerSchool Data …
-
News & ResourcesIoT Security
Understanding the Murdoc Botnet Mirai Variant: How It Exploits IoT Vulnerabilities
by CSC Newsby CSC News 2 minutes readCybersecurity experts are raising alarms about the Murdoc Botnet Mirai Variant, a new and dangerous malware strain targeting Internet of Things (IoT) devices. Leveraging known vulnerabilities in Avtech …