Cyber Attack Cyber Attacks Cybersecurity Privacy Renault Security United Kingdom2 Min Read October 2, 2025 Renault UK Customer Records Stolen in Third-Party Breach Renault UK is informing customers that their personal data may have been compromised following a cyberattack on one of its third-party service…
Bishop Fox Cybersecurity IoT Privacy Security Vulnerability YoLink YoLink Smart Hub2 Min Read October 2, 2025 $20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk Cybersecurity researchers at Bishop Fox have revealed security vulnerabilities in the popular, inexpensive YoLink Smart Hub (v0382), leaving…
AI Artificial Intelligence Cybersecurity Gemini AI Gemini Trifecta Google Security Vulnerability2 Min Read October 2, 2025 Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which…
Blackpoint Cyber Cyber Attack Cybersecurity Fraud Malware Phishing Phishing Scam PowerShell Scam Security Windows3 Min Read October 2, 2025 Malicious ZIP Files Use Windows Shortcuts to Drop Malware A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’ trust…
AI Artificial Intelligence Cybersecurity Ransomware Security SMB3 Min Read October 2, 2025 Small Businesses and Ransomware: Navigating the AI Era Threat Ransomware has evolved from a niche hacker tactic into a mainstream threat, and small businesses are increasingly in the crosshairs. While…
Airline Canada Cyber Attack Cyber Attacks Cybersecurity Passport Privacy Security WestJet3 Min Read October 1, 2025 WestJet Confirms Passenger IDs and Passports Stolen in Cyberattack WestJet, a leading Canadian airline based in Calgary, has confirmed that a cybersecurity attack exposed personal information belonging to some…
AI Cyber Attack Cyber Crime Cybersecurity FraudGPT MatrixPDF Phishing Security SpamGPT WormGPT2 Min Read October 1, 2025 Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks A new trend lately observed in the world of cybercrime is the demand for user-friendly, plug-and-play tools that make it easier for people…
Cyber Attack Cyber Crime Cybersecurity Detour Dog DNS Infostealer Los Pollos Malware Security Strela Stealer2 Min Read October 1, 2025 Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer New research from Infoblox Threat Intel has revealed that an established, persistent group of cybercriminals, Detour Dog, has been silently…
Bitcoin China Cryptocurrency Cyber Crime Cybersecurity Dubai Scam United Kingdom Yadi Zhang Zhimin Qian2 Min Read October 1, 2025 London Court Convicts Chinese Mastermind Behind £5bn Crypto Seizure The mastermind behind one of China’s largest financial frauds has pleaded guilty in a London court, confessing to her role in laundering…
Afghanistan China Cyber Attack Cyber Attacks Cybersecurity IIServerCore Malware Mustang Panda NET-STAR Pakistan Phantom Taurus Security Winnti2 Min Read September 30, 2025 Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years Researchers at Palo Alto Networks say a Chinese-linked cyberespionage group has been targeting foreign ministries, embassies, and…
ClaimPix Cybersecurity Jeremiah Fowler Leaks Misconfiguration Privacy Security Vulnerability2 Min Read September 30, 2025 US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online A massive collection of data belonging to customers of ClaimPix, an Illinois-based platform for managing auto insurance claims across the…
Cyber Crime Cybersecurity Europol Netherlands Russia2 Min Read September 29, 2025 Dutch Teens Arrested Over Alleged Spying for Pro-Russian Hackers Two 17-year-old boys from the Netherlands have been arrested on suspicion of spying for pro-Russian hackers, Dutch authorities recently…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
Amatera Stealer Crypto Cryptojacking Cybersecurity Malware Phishing Phishing Scam Police PureMiner Security SVG Ukraine2 Min Read September 26, 2025 Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner Hackers are distributing malicious emails that imitate official notices from the National Police of Ukraine. This phishing campaign,…
Archer Health Cybersecurity Healthcare Jeremiah Fowler Leaks Misconfiguration Privacy Security2 Min Read September 26, 2025 Archer Health Data Leak Exposes 23GB of Medical Records A large cache of medical and personal information belonging to patients of Archer Health Inc. was left publicly accessible after a database…
Cofense Copyright Cryptocurrency Cyber Attack Cybersecurity Infostealer Lone None Lone None Stealer Malware Pure Logs Stealer Scam Security Telegram Vietnam2 Min Read September 25, 2025 Vietnamese Hackers Use Fake Copyright Notices to Spread Lone None Stealer A Vietnamese hacking group known as Lone None is running an online scam campaign that has been active since at least November 2024. The…
AgentForce AI AI agents CRM Cybersecurity ForcedLeak Salesforce Security Vulnerability3 Min Read September 25, 2025 ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data A vulnerability dubbed ForcedLeak was recently discovered in Salesforce Agentforce, an AI-driven system designed to handle complex business…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Cl0p Cybersecurity File Transfer Fortra GoAnywhere Ransomware Security Vulnerability3 Min Read September 25, 2025 Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems Thousands of companies using Fortra’s GoAnywhere Managed File Transfer (MFT) solution are facing an immediate threat of full system…
BRICKSTORM China Cyber Attack Cybersecurity Google Linux Malware Mandiant SaaS Security UNC5221 Vulnerability3 Min Read September 25, 2025 China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity researchers at…
Cyber Attack Cybersecurity Developers Phishing Scam Privacy PSF PyPI Scam Security Software2 Min Read September 24, 2025 PSF Warns of Fake PyPI Login Site Stealing User Credentials The Python Software Foundation (PSF) is warning developers about a fresh phishing campaign that targets users of the Python Package Index…
China CloudSEK Counterfeiters Cyber Crime Cybersecurity Fake ID ForgeCraft Fraud Privacy Scam Scams and Fraud3 Min Read September 19, 2025 Chinese Network Selling Thousands of Fake US and Canadian IDs A recent investigation by cybersecurity firm CloudSEK has exposed a major operation based in China that is selling high-quality, counterfeit…
Cybersecurity Firebox Security Vulnerability WatchGuard3 Min Read September 19, 2025 WatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability WatchGuard has released security updates to fix a high-risk vulnerability in its Firebox firewalls. This issue, CVE-2025-9242, could allow a…
Cyber Attack Cyber Crime Cybersecurity Owen Flowers Scattered Spider TFL Thalha Jubair United Kingdom3 Min Read September 18, 2025 Two UK Teenagers Charged Over TfL Hack Linked to Scattered Spider The cyberattack that disrupted Transport for London (TFL) websites and services in September 2024 has led to charges against two teenagers…
Crypto Cyber Attack Cyber Crime Cybersecurity Empire Podcast Fraud Influencers Podcast Scam Scams and Fraud Security StreamYard Web32 Min Read September 18, 2025 Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer A new phishing campaign is targeting developers and influencers in the crypto industry with fake interview requests that impersonate a popular…
Altcoin Bitcoin Cryptocurrency Cybersecurity DeFi Ethereum4 Min Read September 18, 2025 Shifting Tides: Investors Pivot Toward Altcoins Amid Bitcoin Slowdown In the current cycle, Bitcoin has anchored most of the capital inflow. In 2025, 66% of investors selected Bitcoin as their first digital…
AdTech Cyber Attack Cyber Crime Cybersecurity Fraud Malvertising Malware PropellerAds Russia Scams and Fraud Security Vane Viper3 Min Read September 18, 2025 Vane Viper Malvertising Network Posed as Legit Adtech in Global Scams Cybersecurity firm Infoblox says it has discovered “Vane Viper,” a massive online ad network that posed as a legitimate business…
Cybersecurity Edge Lat61 Malware Point Wild Raven Stealer Security2 Min Read September 17, 2025 New Raven Stealer Malware Hits Browsers for Passwords and Payment Data A new sneaky type of malware, known as Raven Stealer, has been identified by the Lat61 Threat Intelligence Team at Point Wild. The research…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Android Cyber Attack Cybersecurity Meta Samsung Security Vulnerability WhatsApp2 Min Read September 14, 2025 Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The issue,…
Censorship China Cybersecurity Great Firewall of China Leaks Privacy Security Surveillance3 Min Read September 13, 2025 600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations. Full details available on the…
CloudFlare Cyber Attack Cyber Attacks Cybersecurity DDoS DDoS attack IoT Qrator Labs Security Vulnerability2 Min Read September 13, 2025 Qrator Labs Mitigated Record L7 DDoS Attack from 5.76M-Device Botnet In early September, Qrator Labs detected and mitigated one of the most significant L7 DDoS attacks seen this year, carried out by what is now…
AitM Cyber Attack Cybersecurity Google MFA Microsoft Okta PhaaS Phishing Phishing Scam Security VoidProxy2 Min Read September 13, 2025 New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
BreachForums Cyber Crime Cybersecurity Google Jaguar Land Rover Lapsus$ Salesforce Scattered Lapsus$ Hunters Scattered Spider ShinyHunters2 Min Read September 12, 2025 Scattered Lapsus$ Hunters Hacker Group Announces Shutdown Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the group is fracturing under…
ConnectWise RAT Cyber Attack Cybersecurity Fraud Info Stealer Malware Muck Stealer Phishing Phishing Scam Security SimpleHelp RAT2 Min Read September 12, 2025 Muck Stealer Malware Used Alongside Phishing in New Attack Waves A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise…
Ascension Cyber Attack Cyber Attacks Cybersecurity FTC Ransomware Security Senator USA Vulnerability2 Min Read September 11, 2025 Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware attack on Ascension Hospital,…
Agentic AI AppSheet Cybersecurity Fraud Google Google Workspace Phishing Phishing Scam Raven AI Scam Security3 Min Read September 11, 2025 New Google AppSheet Phishing Scam Deliver Fake Trademark Notices A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using legitimate tools…
Cyber Attack Cyber Attacks Cybersecurity LNER Security UK Vulnerability3 Min Read September 11, 2025 UK Rail Operator LNER Confirms Cyber Attack Exposing Passenger Data LNER cyber attack exposes passenger contact details and journey data. No financial information or passwords were taken, but customers are…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…
AsyncRAT Cyber Attack Cybersecurity Fileless Malware ScreenConnect Security SentinelOne TROJAN2 Min Read September 10, 2025 New Fileless Malware Attack Uses AsyncRAT for Credential Theft LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote Access…