Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
China CloudSEK Counterfeiters Cyber Crime Cybersecurity Fake ID ForgeCraft Fraud Privacy Scam Scams and Fraud3 Min Read September 19, 2025 Chinese Network Selling Thousands of Fake US and Canadian IDs A recent investigation by cybersecurity firm CloudSEK has exposed a major operation based in China that is selling high-quality, counterfeit…
Cybersecurity Firebox Security Vulnerability WatchGuard3 Min Read September 19, 2025 WatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability WatchGuard has released security updates to fix a high-risk vulnerability in its Firebox firewalls. This issue, CVE-2025-9242, could allow a…
Cyber Attack Cyber Crime Cybersecurity Owen Flowers Scattered Spider TFL Thalha Jubair United Kingdom3 Min Read September 18, 2025 Two UK Teenagers Charged Over TfL Hack Linked to Scattered Spider The cyberattack that disrupted Transport for London (TFL) websites and services in September 2024 has led to charges against two teenagers…
Crypto Cyber Attack Cyber Crime Cybersecurity Empire Podcast Fraud Influencers Podcast Scam Scams and Fraud Security StreamYard Web32 Min Read September 18, 2025 Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer A new phishing campaign is targeting developers and influencers in the crypto industry with fake interview requests that impersonate a popular…
Altcoin Bitcoin Cryptocurrency Cybersecurity DeFi Ethereum4 Min Read September 18, 2025 Shifting Tides: Investors Pivot Toward Altcoins Amid Bitcoin Slowdown In the current cycle, Bitcoin has anchored most of the capital inflow. In 2025, 66% of investors selected Bitcoin as their first digital…
AdTech Cyber Attack Cyber Crime Cybersecurity Fraud Malvertising Malware PropellerAds Russia Scams and Fraud Security Vane Viper3 Min Read September 18, 2025 Vane Viper Malvertising Network Posed as Legit Adtech in Global Scams Cybersecurity firm Infoblox says it has discovered “Vane Viper,” a massive online ad network that posed as a legitimate business…
Cybersecurity Edge Lat61 Malware Point Wild Raven Stealer Security2 Min Read September 17, 2025 New Raven Stealer Malware Hits Browsers for Passwords and Payment Data A new sneaky type of malware, known as Raven Stealer, has been identified by the Lat61 Threat Intelligence Team at Point Wild. The research…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Android Cyber Attack Cybersecurity Meta Samsung Security Vulnerability WhatsApp2 Min Read September 14, 2025 Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The issue,…
Censorship China Cybersecurity Great Firewall of China Leaks Privacy Security Surveillance3 Min Read September 13, 2025 600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations. Full details available on the…
CloudFlare Cyber Attack Cyber Attacks Cybersecurity DDoS DDoS attack IoT Qrator Labs Security Vulnerability2 Min Read September 13, 2025 Qrator Labs Mitigated Record L7 DDoS Attack from 5.76M-Device Botnet In early September, Qrator Labs detected and mitigated one of the most significant L7 DDoS attacks seen this year, carried out by what is now…
AitM Cyber Attack Cybersecurity Google MFA Microsoft Okta PhaaS Phishing Phishing Scam Security VoidProxy2 Min Read September 13, 2025 New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
BreachForums Cyber Crime Cybersecurity Google Jaguar Land Rover Lapsus$ Salesforce Scattered Lapsus$ Hunters Scattered Spider ShinyHunters2 Min Read September 12, 2025 Scattered Lapsus$ Hunters Hacker Group Announces Shutdown Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the group is fracturing under…
ConnectWise RAT Cyber Attack Cybersecurity Fraud Info Stealer Malware Muck Stealer Phishing Phishing Scam Security SimpleHelp RAT2 Min Read September 12, 2025 Muck Stealer Malware Used Alongside Phishing in New Attack Waves A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise…
Ascension Cyber Attack Cyber Attacks Cybersecurity FTC Ransomware Security Senator USA Vulnerability2 Min Read September 11, 2025 Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware attack on Ascension Hospital,…
Agentic AI AppSheet Cybersecurity Fraud Google Google Workspace Phishing Phishing Scam Raven AI Scam Security3 Min Read September 11, 2025 New Google AppSheet Phishing Scam Deliver Fake Trademark Notices A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using legitimate tools…
Cyber Attack Cyber Attacks Cybersecurity LNER Security UK Vulnerability3 Min Read September 11, 2025 UK Rail Operator LNER Confirms Cyber Attack Exposing Passenger Data LNER cyber attack exposes passenger contact details and journey data. No financial information or passwords were taken, but customers are…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…
AsyncRAT Cyber Attack Cybersecurity Fileless Malware ScreenConnect Security SentinelOne TROJAN2 Min Read September 10, 2025 New Fileless Malware Attack Uses AsyncRAT for Credential Theft LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote Access…
Cybersecurity Malware3 Min Read September 10, 2025 Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Cybersecurity Malware3 Min Read September 4, 2025 Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks…
Cybersecurity Recap22 Min Read August 25, 2025 Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage,…
Cybersecurity4 Min Read August 25, 2025 Cyber Security Simulation Training Mistakes That CISOs Must Avoid Your team’s ability to identify phishing attempts in their inboxes has the potential to make or break your entire security posture,…
Cybercrime Cybersecurity4 Min Read August 25, 2025 Healthcare Organizations at Risk: Managing Human Vulnerability in Cybersecurity The battle against cybercrime continues to be a significant topic for organizations across all industries, however the threat to the health…
Cybersecurity2 Min Read August 25, 2025 Cybercriminals Are Selling Access to Chinese Surveillance Cameras Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research…
Cybersecurity Hacking News23 Min Read August 25, 2025 ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More Power doesn’t just disappear in one big breach. It slips away in the small stuff—a patch that’s missed, a setting…