MSP Security Operating Model Checklist Security pressure on MSPs doesn’t come from a single place.It builds up through response expectations, operational load, and growing compliance demands. This checklist is designed as a practical self-check.It helps MSPs reflect on how security is…
Resources form Webinar on Cyber Risks During Bulgaria’s Euro Transition
Resources form Webinar on Cyber Risks During Bulgaria’s Euro Transition Date: December 4, 2025Time: 14:00 – 14:45 EET Language: Bulgarian On December 4, DIAMATIX delivered the webinar“Cyber Risks and Fraud Scenarios During Bulgaria’s Transition to the Euro”,with participants from organizations and…
Cisco Fixes Zero-Day RCE Actively Exploited in Secure Email Gateways
Cisco Fixes Zero-Day RCE Actively Exploited in Secure Email Gateways Cisco Systems has released security updates addressing a maximum-severity vulnerability affecting Cisco Secure Email Gateway and Secure Email and Web Manager appliances.The flaw was previously exploited as a zero-day by a…
Palo Alto GlobalProtect Vulnerability Allows Firewall Disruption Without Authentication
Palo Alto GlobalProtect Vulnerability Allows Firewall Disruption Without Authentication Palo Alto Networks has released security updates addressing a high-severity vulnerability in GlobalProtect Gateway and Portal that allows an unauthenticated attacker to trigger a denial-of-service (DoS) condition and force firewalls into maintenance…
Advanced Magecart Campaign Hijacks Checkout Pages to Steal Payment Card Data
Advanced Magecart Campaign Hijacks Checkout Pages to Steal Payment Card Data Cybersecurity researchers have identified an active and highly sophisticated Magecart campaign targeting e-commerce websites in early 2026. The attack enables threat actors to steal payment card data directly during checkout,…
Android Accessibility Bug Redirects Volume Buttons, Breaking Core Device Functions
Android Accessibility Bug Redirects Volume Buttons, Breaking Core Device Functions Google has confirmed a platform-level bug affecting Android devices where physical volume buttons stop controlling media volume when the Select to Speak accessibility feature is enabled. Instead of adjusting media sound,…
Attack #1: Phishing & Social Engineering
Attack #1: Phishing & Social Engineering Threat snapshot – Phishing & Social Engineering Category Summary What it is Attacks that manipulate people into taking actions – opening files, entering credentials, approving payments, or granting access. Most common targets Employees, finance…
Threat Library: What It Is and Why We Created It
Threat Library: What It Is and Why We Created It Cyber attacks are often presented as something mysterious, extremely complex, or inherently frightening.In reality, most incidents do not begin with sophisticated techniques. They start with familiar patterns. Human error. System gaps….
Active Exploitation of Gogs Vulnerability Exposes Self-Hosted Git Environments
Active Exploitation of Gogs Vulnerability Exposes Self-Hosted Git Environments The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity vulnerability affecting Gogs to its Known Exploited Vulnerabilities (KEV) catalog, confirming that the flaw is being actively exploited in real-world…
ThreatScope by DIAMATIX: Vulnerability Trends & Emerging Risks (05–11 January 2026)
ThreatScope by DIAMATIX: Vulnerability Trends & Emerging Risks (05–11 January 2026) Between 05 and 11 January 2026, multiple vulnerabilities were disclosed across enterprise security platforms, automation workflows, networking devices, web frameworks, content management systems, and open-source libraries. This edition of ThreatScope…









