
How to Make CTEM Operational versus Aspirational
Continuous threat exposure management (CTEM) must evolve from a strategic buzzword into an everyday security rhythm. The piece outlines seven priorities—continuous asset reality, attacker‑centric exposure modeling, cross‑environment correlation, exploitability validation, dynamic reprioritization, outcome‑based metrics, and workflow integration—to embed CTEM in daily operations. By abandoning batch scans and siloed ticketing, CISOs can turn visibility into actionable risk reduction. Without operational CTEM, organizations maintain an illusion of control while attackers exploit the gaps.

Medtronic Says Cyberattack Did Not Disrupt Its Operations
Medtronic announced on April 24 that a Handala‑linked cyberattack breached its corporate IT systems, granting unauthorized access to data. The company emphasized that its product, patient‑safety, manufacturing, distribution and financial reporting networks remained untouched thanks to strict segmentation. While no...

‘AiFrame’ Browser Attacks Continue with Fake Authenticator, Converter Extensions
Six new malicious Chrome extensions tied to the AiFrame campaign have been uncovered, expanding the original set of 32 AI‑impersonating add‑ons. The extensions—including a fake two‑factor authenticator, an AI‑to‑PDF converter and a HEIC‑to‑JPG tool—have roughly 134,000 combined installs and request...

US, Allies Warn of Industrialized Chinese Botnets
The United States, United Kingdom and eight allied nations warned that Chinese state‑backed groups are operating industrial‑scale botnets using compromised routers and IoT devices. The joint advisory identified the Volt Typhoon operation, which hijacks outdated Cisco and Netgear routers to expand...

AppleScript Infostealer Deployed in New macOS ClickFix Campaign
A new macOS‑targeted ClickFix campaign is distributing an AppleScript‑based infostealer that harvests credentials and session cookies from browsers, extensions, and cryptocurrency wallets. The malware tricks users with a counterfeit CAPTCHA page and asks them to paste a curl command into...

Ironscales CEO: AI Has Reset Email Threat Landscape
Ironscales CEO Eyal Benishti says generative AI has upended traditional secure email gateways, erasing the malformed syntax and malicious attachment cues those systems rely on. In the emerging "Phishing 3.0" era, attackers craft flawless, hyper‑personalized messages that slip past legacy filters,...

SOCs Drowning in Alerts Despite Tool Investment
Security operations centers (SOCs) are overwhelmed by the sheer volume of daily alerts, outpacing analysts' ability to manually enrich and contextualize them. The bottleneck stems from raw alert generation, not a lack of telemetry, leading to longer dwell times and...

WEF Warns Port Cyber Risk Now Ecosystem-Wide
The World Economic Forum warns that rapid digitisation has turned port cyber risk into a systemic, ecosystem‑wide threat. Maritime cyber incidents surged 103% in 2025 as attackers move laterally across terminals, logistics partners, and inland transport networks. The forum cites...

New NGate Malware Variant Targets Android Users with NFC Payment Data Theft
A new NGate malware variant disguises itself as the HandyPay Android app to steal NFC payment data. The trojanized app prompts users to set it as the default NFC payment tool, captures card numbers, expiration dates and PINs, and exfiltrates...

China Emerges as 'Peer Competitor in Cyberspace,' UK NCSC Head Warns
UK National Cyber Security Centre chief Richard Horne warned that China has become a "peer competitor in cyberspace," marking a shift from earlier, softer characterisations. The NCSC reports an average of four nationally significant cyber attacks per week, with state‑linked...

Guilt Admitted by British Hacker in $8M Crypto Theft Scheme
British hacker Tyler Buchanan pleaded guilty to a scheme that stole at least $8 million in cryptocurrency from U.S. victims, targeting roughly 12 companies across virtual‑currency, technology, telecom and entertainment sectors between September 2021 and April 2023. Prosecutors say he and co‑conspirators used...

Over 400K Records Allegedly Stolen From Major Dutch Webshop Bol, Data Leaked
A hacker using the alias “Jeffrey Epstein” claims to have stolen data on over 400,000 Belgian customers of Dutch e‑commerce giant Bol. The alleged dataset includes names, birthdates, contact details, shipping information and order history, though passwords and bank data are...

Crypto Stealing Wallet Apps Proliferate in Apple App Store
A wave of 26 counterfeit crypto‑wallet apps masquerading as Coinbase, MetaMask, OneKey and Trust Wallet surfaced in the Apple App Store. The apps redirected users to phishing pages that installed malicious provisioning profiles, enabling the theft of mnemonic seed phrases....

Microsoft Teams, Quick Assist Weaponized in Helpdesk Spoofing Intrusions
Threat actors are weaponizing Microsoft Teams and Quick Assist in a new help‑desk impersonation campaign. Attackers send spoofed Teams messages that convince users to approve a Quick Assist session, granting the intruder full control of the device within minutes. Once...

Novel Malware Campaign Bundles Gh0st RAT, CloverPlus Adware
A new malware campaign combines the Gh0st RAT remote‑access trojan with CloverPlus adware to monetize infected PCs while maintaining long‑term control. Attackers use an obfuscated loader that first installs CloverPlus to display ads and generate click revenue, then deploys a...