Cubex Group
  • Home
  • Services
    • Cubex Group Security Solution
    • Staffing Solutions
    • IT Solutions Consulting
    • MSP Custom Solutions
    • Security Awareness Training
  • About
  • News
    • Blog
    • Industry Articles
  • Contact
Select Page
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers ​

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers ​

by cubexgroup | Apr 25, 2025

Read More Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain...
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks ​

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks ​

by cubexgroup | Apr 25, 2025

Read More Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were “installed by...
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware ​

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware ​

by cubexgroup | Apr 24, 2025

Read More At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s software, IT, financial, semiconductor manufacturing, and...
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools ​

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools ​

by cubexgroup | Apr 24, 2025

Read More Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a “major blind spot in Linux runtime...
Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign ​

Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign ​

by cubexgroup | Apr 24, 2025

Read More The Evolving Healthcare Cybersecurity Landscape  Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an...
« Older Entries
Next Entries »

Recent Posts

  • Engage 2025: Bullhorn Amplify and the Next Wave of AI Recruitment
  • Who’s in Charge Here? Managing IT Vendor Relationships Without Losing Your Mind
  • AI Personal Assistants for Business: Picking the Right Fit for Your Operations
  • How Hiring a Fractional CTO Helped a Consulting Firm Cost-Effectively Liquidate a Private College
  • Why You Need a Business VPN Strategy in 2025

Quick Links

About Us

Cubex Group is an IT consulting firm that’s committed to doing right by you, our clients. We invest time to understand your successes and struggles, and design IT solutions that are attuned to what is right and enriching for your business and environment.

Quick Links

Contact

MSP Custom Solutions

Staffing Solutions

Security Awareness Training

Home

IT Solutions Consulting

About

Blog

Careers

Contact Us

 223 Wall Street, Suite 267, Huntington, NY 11743

917.67.CUBEX (28239)

info@cubexgroup.com

Follow Us on LinkedIn
SEND US A MESSAGE

Cubex Group © 2025 All rights reserved.

Privacy Policy      Terms & Conditions

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.