Data Breach Malware Phishing Ransomware2 Min Read August 28, 2025 ShadowSilk Campaign Targets Central Asian Governments A series of cyber-attacks against government organizations in Central Asia and the Asia-Pacific has been linked to a threat cluster known as…
Malware Vulnerabilities3 Min Read August 28, 2025 Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation Citrix has released patches for three zero-day vulnerabilities in NetScaler ADC and Gateway, one of which was already being exploited by…
Malware Ransomware Vulnerabilities Windows4 Min Read August 28, 2025 Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an…
Apple Linux Malware Vulnerabilities Windows2 Min Read August 28, 2025 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158 Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which…
Apple Malware Ransomware Vulnerabilities4 Min Read August 28, 2025 Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day…
Android Data Breach Malware Phishing Ransomware Windows4 Min Read August 27, 2025 HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
Android Malware Phishing Ransomware2 Min Read August 27, 2025 New Android Trojan Variant Expands with Ransomware Tactics A new version of the Hook Android banking Trojan has surfaced, showcasing one of the most extensive feature sets ever recorded for mobile…
Malware Network Phishing2 Min Read August 27, 2025 Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools A global phishing campaign using personalized emails and fake websites to deliver malicious downloads has been identified by cybersecurity…
Malware Phishing4 Min Read August 27, 2025 Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving rapidly,…
DDoS Malware Network Vulnerabilities2 Min Read August 27, 2025 CISA Adds Citrix Vulnerabilities to KEV Catalog as New Flaws Emerge The U.S. Cybersecurity and Information Security Agency (CISA) has added two Citrix vulnerabilities to its Known Exploited Vulnerabilities…
DDoS Malware Ransomware Vulnerabilities2 Min Read August 27, 2025 Citrix patches trio of NetScaler bugs – after attackers beat them to it Citrix has pushed out fixes for three fresh NetScaler holes – and yes, they’ve already been used in the wild before the vendor got…
Cloud Security Data Breach Malware Phishing Ransomware Vulnerabilities5 Min Read August 27, 2025 Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However,…
DDoS Malware Vulnerabilities2 Min Read August 27, 2025 NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775) Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of…
Cyber Espionage Malware3 Min Read August 26, 2025 UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities…
Cloud Security Malware4 Min Read August 26, 2025 Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware…
August 26, 2025 Ten Years of Resilience, Innovation & Community-Driven Defense The world of cybersecurity has been a wild ride over the last decade. As attackers stepped up their game year over year, the security…
Malware Network Phishing Ransomware Vulnerabilities Windows2 Min Read August 26, 2025 Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging…
Malware Ransomware Windows2 Min Read August 26, 2025 Onderzoeker: ransomware-aanval op telecombedrijf Colt via SharePoint-server De ransomware-aanval op het Britse telecombedrijf Colt heeft plaatsgevonden via een gecompromitteerde SharePoint-server, zo stelt…
August 25, 2025 MURKY PANDA: A Trusted-Relationship Threat in the Cloud Since late 2024, CrowdStrike Counter Adversary Operations has observed significant activity conducted by MURKY PANDA, a China-nexus adversary…
Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Apple Malware Ransomware2 Min Read August 25, 2025 Fake macOS Help Sites Seek to Spread Infostealer in Targeted Campaign A sophisticated malvertising campaign which sought to deploy a variant of Atomic macOS Stealer (AMOS) has targeted hundreds of…
Cybercrime Malware2 Min Read August 25, 2025 Chinese Developer Jailed for Deploying Malicious Code at US Company A Chinese software developer has been sentenced after being convicted of causing intentional damage to protected computers by deploying…
Malware Zero Trust4 Min Read August 25, 2025 Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks…
Cyber Attack Malware3 Min Read August 25, 2025 Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating…
Malware4 Min Read August 25, 2025 Watering Hole Attacks Push ScanBox Keylogger Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based…
Malware2 Min Read August 25, 2025 Ransomware Attacks are on the Rise Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. After a recent dip,…
Malware3 Min Read August 25, 2025 Fake Reservation Links Prey on Weary Travelers Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked…
Linux Malware2 Min Read August 25, 2025 Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and…
Cyber Attack Malware3 Min Read August 25, 2025 New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access…
Enterprise Security Malware2 Min Read August 25, 2025 Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated delivery mechanisms to deploy the…
Malware Supply Chain Attack3 Min Read August 25, 2025 Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior…
Android Malware2 Min Read August 25, 2025 ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in…
Malware Vulnerability3 Min Read August 25, 2025 Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw impacting Microsoft Windows to deliver malicious…
Malware Open Source3 Min Read August 25, 2025 Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure entities in Taiwan using customized…
Apple Malware3 Min Read August 25, 2025 Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw A seven-year-old vulnerability affecting end-of-life Cisco network devices is being exploited by a Russian state-sponsored cyber espionage…
Cloud Security Malware2 Min Read August 25, 2025 Oregon Man Charged in Rapper Bot DDoS-for-Hire Case A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire botnet, which was allegedly used to launch…
Malware3 Min Read August 25, 2025 “PromptFix” Attacks Could Supercharge Agentic AI Threats Researchers have engineered a new version of the ClickFix social engineering technique using prompt injection to trick agentic AI into…
Apple Malware2 Min Read August 25, 2025 Apple Releases Patch for Likely Exploited Zero-Day Vulnerability In a series of updates for its iOS, iPadOS, and macOS operating systems, Apple released a patch for a previously unknown vulnerability that…
Cloud Security Malware Ransomware Windows6 Min Read August 14, 2025 Datadog threat roundup: Top insights for Q2 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…
Cloud Security Malware Ransomware Vulnerabilities10 Min Read July 21, 2025 Beyond Mimo’lette: Tracking Mimo's Expansion to Magento CMS and Docker Executive summary Through investigations into a string of workload compromises involving ecommerce sites, the Datadog Security Research team…
Cloud Security Malware Ransomware Vulnerabilities24 Min Read July 16, 2025 I SPy: Escalating to Entra ID's Global Admin with a first-party app This research was presented at fwd:cloudsec North America on June 30th, 2025. You can find the talk here. Key points Service principals (SPs)…
Malware Network Ransomware Windows12 Min Read May 21, 2025 The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions Key points and observations Datadog Security Research discovered three malicious VS Code extensions that target Solidity developers on…