top of page

Latest News

Upside's list of articles and news

AI in 2025: Reality Check for Business and Security Leaders

Dec 31, 2025

Businesses are rethinking AI adoption as rising costs, unreliable outputs, and security gaps expose risks behind the hype. Poorly governed AI deployments are expanding attack surfaces and creating new cybersecurity challenges.

The Cyber Threats That Defined 2025: And What They Mean for Your Business

Dec 30, 2025

2025 was defined by escalating nation-state cyber espionage, supply-chain compromises, and critical zero-day vulnerabilities with global impact. From telecom breaches to open-source malware, attackers exploited trust, scale, and interconnected systems.

Hackers Exploiting OAuth Device Codes to Breach Microsoft 365 Accounts

Dec 29, 2025

Cybercriminals are exploiting Microsoft 365’s device code authentication to gain unauthorized access to accounts. Phishing campaigns trick users into entering codes on legitimate login portals, bypassing security measures.

Interpol Dismantles Major Cybercrime Networks: A Warning for Every Business

Dec 27, 2025

Interpol coordinated a month-long crackdown across 19 countries that shut down multiple cybercrime networks operating across Africa. The operation led to hundreds of arrests, millions in recovered funds, and the takedown of thousands of malicious links tied to ransomware, email fraud, and extortion.

The Hidden Cyber Threat Inside Remote Hiring

Dec 25, 2025

State-linked actors are exploiting remote hiring to infiltrate organizations using stolen identities and fake credentials. Even mature companies are facing rising risk as attackers blend seamlessly into legitimate recruitment pipelines.

What the Nova Scotia Power Cyberattack Reveals About Incident Response and Risk

Dec 24, 2025

A cyberattack on a major power utility exposed the personal data of hundreds of thousands of customers and triggered regulatory scrutiny. The incident highlights how delays in detection and limited visibility can significantly expand the impact of a breach.

Cyberattack Hits Romanian Water Authority: Could Your Business Be Next?

Dec 23, 2025

A ransomware attack crippled Romania’s water management authority, taking nearly 1,000 computers offline across most regional offices by encrypting core systems. While water delivery continued, the incident highlights how vulnerable critical infrastructure remains to modern cyber threats.

BlindEagle Hackers Target Government Agencies Using Sophisticated PowerShell Attacks

Dec 22, 2025

BlindEagle threat actors used multi-stage, file-less attacks with phishing emails, PowerShell scripts, and obfuscated malware to target government systems. The campaign highlights the growing complexity of cyberattacks and the need for proactive, layered security defenses.

Cisco VPNs and Email Services Targeted in Separate Cyberattack Campaigns

Dec 19, 2025

Critical zero-day vulnerability in Cisco email appliances and high-volume VPN brute-force attacks expose the evolving threats facing organizations today. Sophisticated exploits and opportunistic attacks demonstrate the urgent need for proactive cybersecurity defenses.

When Fake Exploits Create Real Risk for Businesses

Dec 18, 2025

A flood of AI-generated and nonworking exploit proofs is obscuring the real danger behind a critical React vulnerability, leading teams to falsely believe they are protected. While defenders chase unreliable signals, attackers quietly move ahead, widening the gap between detection and real remediation.

Apple and Google Confirm Active Zero-Day Exploitation: What Businesses Should Know

Dec 17, 2025

Apple and Google rushed emergency patches after confirming attackers were already exploiting zero-day flaws in real-world attacks. The involvement of advanced threat-hunting teams suggests spyware-level abuse rather than routine cybercrime.

Are Your Login Protections Enough? BlackForce Shows They Might Not Be

Dec 16, 2025

BlackForce phishing kit hijacks users’ login sessions in real time, capturing credentials and one-time MFA codes directly in the browser. Already used against major brands, it shows how attackers are bypassing traditional security protections with advanced techniques.

bottom of page