AitM Cyber Attack Cybersecurity Google MFA Microsoft Okta PhaaS Phishing Phishing Scam Security VoidProxy2 Min Read September 13, 2025 New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
BreachForums Cyber Crime Cybersecurity Google Jaguar Land Rover Lapsus$ Salesforce Scattered Lapsus$ Hunters Scattered Spider ShinyHunters2 Min Read September 12, 2025 Scattered Lapsus$ Hunters Hacker Group Announces Shutdown Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the group is fracturing under…
ConnectWise RAT Cyber Attack Cybersecurity Fraud Info Stealer Malware Muck Stealer Phishing Phishing Scam Security SimpleHelp RAT2 Min Read September 12, 2025 Muck Stealer Malware Used Alongside Phishing in New Attack Waves A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise…
Ascension Cyber Attack Cyber Attacks Cybersecurity FTC Ransomware Security Senator USA Vulnerability2 Min Read September 11, 2025 Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware attack on Ascension Hospital,…
Agentic AI AppSheet Cybersecurity Fraud Google Google Workspace Phishing Phishing Scam Raven AI Scam Security3 Min Read September 11, 2025 New Google AppSheet Phishing Scam Deliver Fake Trademark Notices A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using legitimate tools…
Cyber Attack Cyber Attacks Cybersecurity LNER Security UK Vulnerability3 Min Read September 11, 2025 UK Rail Operator LNER Confirms Cyber Attack Exposing Passenger Data LNER cyber attack exposes passenger contact details and journey data. No financial information or passwords were taken, but customers are…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…
AsyncRAT Cyber Attack Cybersecurity Fileless Malware ScreenConnect Security SentinelOne TROJAN2 Min Read September 10, 2025 New Fileless Malware Attack Uses AsyncRAT for Credential Theft LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote Access…
Cybersecurity Malware3 Min Read September 10, 2025 Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Cybersecurity Malware3 Min Read September 4, 2025 Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks…
Cybersecurity Recap22 Min Read August 25, 2025 Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage,…
Cybersecurity4 Min Read August 25, 2025 Cyber Security Simulation Training Mistakes That CISOs Must Avoid Your team’s ability to identify phishing attempts in their inboxes has the potential to make or break your entire security posture,…
Cybercrime Cybersecurity4 Min Read August 25, 2025 Healthcare Organizations at Risk: Managing Human Vulnerability in Cybersecurity The battle against cybercrime continues to be a significant topic for organizations across all industries, however the threat to the health…
Cybersecurity2 Min Read August 25, 2025 Cybercriminals Are Selling Access to Chinese Surveillance Cameras Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research…