security coast

Website Security Checklist: 25 Essential Steps for Small Businesses

If you’re running a small business, you might think hackers aren’t interested in your website. This dangerous misconception puts thousands of businesses at risk every day. The truth is that cybercriminals specifically target small businesses because they often lack robust security measures while still processing valuable customer data, payment information, and proprietary business intelligence.

Read More

Critical Fortinet FortiWeb Zero-Day Vulnerability

Fortinet has confirmed a critical zero-day vulnerability in its FortiWeb Web Application Firewall (WAF) that has been actively exploited in the wild for several weeks before public disclosure. Tracked as CVE-2025-64446 with a maximum severity score of 9.8 out of 10, this relative path traversal vulnerability allows completely unauthenticated attackers to execute arbitrary administrative commands on vulnerable systems.

Read More
Lazarus Group

North Korean Lazarus Group Exploits JSON Storage Services to Deploy Advanced Malware

In a sophisticated evolution of supply chain attacks, North Korean state-sponsored threat actors affiliated with the notorious Lazarus Group have weaponized legitimate JSON storage services to host and distribute advanced malware. This alarming campaign, dubbed “Contagious Interview,” specifically targets software developers through social engineering tactics on professional networking platforms, particularly LinkedIn.

Read More
SVG security

Turning Innocent-Looking SVGs into Phishing Lures

Traditional phishing attachments (macro-docs, PDFs) are losing traction. Attackers are pivoting to a lesser-suspected vector: SVG vector files, which look like harmless graphics yet contain interactive, script-enabled code. According to recent research by Hoxhunt, SVG attachments were nearly negligible in 2024 (~0.1 % of attacks) but ballooned to 4.9 % of phishing lures in just the first half of 2025 — and peaked near 15 % in March 2025.
Why does this matter? Because SVGs combine trust (image format) + capability (XML, scripting, external references) — making them ideal for stealthy, high-impact phishing.

Read More