How Attackers Bypass Synced Passkeys

Oct 15, 2025Ravie LakshmananData Protection / Browser Security TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) … Read more

Bridging the Cybersecurity Skills Gap Worldwide – loopz

Bridging the cybersecurity skills gap requires a multi-faceted approach focused on expanding the educational pipeline, upskilling and reskilling the existing workforce, leveraging technology as a force multiplier, and fostering a more diverse and inclusive field. As of September 2, 2025, the global shortage of qualified cybersecurity professionals remains one of the most critical challenges facing … Read more

Cybersecurity in the Oil and Gas Sector – loopz

Cybersecurity in the oil and gas sector is a critical issue of national and economic security, focused on protecting the industrial control systems (ICS) that manage highly volatile physical processes from attacks that could cause catastrophic physical, environmental, and economic damage. As of September 2, 2025, for a nation like Pakistan, whose economy is deeply … Read more

Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

Oct 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation that can result in unauthenticated remote code execution … Read more

The Rise of Nation-State Cyber Warfare – loopz

The rise of nation-state cyber warfare marks the establishment of cyberspace as the “fifth domain” of conflict, alongside land, sea, air, and space, where governments use digital weapons to achieve strategic geopolitical objectives. As of September 2, 2025, this is not a future threat; it is a present-day reality. For nations like Pakistan, cyber warfare … Read more

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it … Read more