Malware Threat Intelligence2 Min Read September 2, 2025 Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE The North Korea-linked threat actor known as the Lazarus Group has been attributed to a social engineering campaign that distributes three…
Cryptocurrency Malware2 Min Read September 2, 2025 Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop apps…
Malware3 Min Read September 1, 2025 ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka…
Apple Malware Vulnerabilities2 Min Read August 31, 2025 WhatsApp 0-Day Exploited in Attacks on Targeted iOS and macOS Users WhatsApp has patched a critical 0-day (CVE-2025-55177) that allowed zero-click spyware attacks on iOS and Mac users. The flaw was used to…
Data Breach Malware Phishing Ransomware5 Min Read August 31, 2025 How Businesses Can Protect Themselves Against Data Breaches The Threat Landscape According to the Identity Theft Resource Center, one billion people have been victims of a data breach in just the second…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
Endpoint Security Malware4 Min Read August 30, 2025 Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring…
Android Apple Malware Phishing Vulnerabilities2 Min Read August 30, 2025 WhatsApp’s Zero-Click Vulnerability and Targeted Spyware Attacks A newly discovered critical vulnerability has put WhatsApp users across the globe on high alert. CVE-2025-55177, patched in August 2025, was a…
Apple DDoS Malware Network Ransomware Vulnerabilities Windows2 Min Read August 30, 2025 MystRodX: A Stealthy New Backdoor Found Hiding in Networks for Over 20 Months Ddos August 30, 2025 XLab has identified a previously unknown and stealthy backdoor dubbed MystRodX, capable of operating undetected in…
Apple Malware Vulnerabilities2 Min Read August 29, 2025 WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific…
Malware Network Phishing Ransomware Vulnerabilities Windows4 Min Read August 29, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in…
Malware Phishing Ransomware Windows4 Min Read August 29, 2025 North Korean Hackers Weaponize Seoul Intelligence Files to Target South Koreans A large-scale spear-phishing campaign targeting South Korean government and intelligence staff has exploited a national intelligence…
Malware Threat Intelligence2 Min Read August 29, 2025 Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked…
Cyber Espionage Malware4 Min Read August 29, 2025 Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an…
Malware3 Min Read August 29, 2025 Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal…
Malware Ransomware Vulnerabilities Windows3 Min Read August 29, 2025 State-Sponsored Hackers Behind Majority of Vulnerability Exploits The majority (53%) of attributed vulnerability exploits in the first half 2025 were conducted by state-sponsored actors for strategic,…
Malware3 Min Read August 29, 2025 TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites…
Malware Ransomware3 Min Read August 28, 2025 Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of…
Malware Phishing Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Fake IT Support Attacks Hit Microsoft Teams A new wave of phishing attacks abusing Microsoft Teams to deliver malware has been uncovered by security researchers. The campaigns, observed…
Malware Phishing Vulnerabilities Windows3 Min Read August 28, 2025 ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader…
Malware Ransomware Windows2 Min Read August 28, 2025 Malicious VS Code Extensions Exploit Name Reuse Loophole A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows…
Malware Phishing Ransomware Vulnerabilities Windows3 Min Read August 28, 2025 When Best Practices Aren’t Enough: UK Breaches Underscore the Importance of Compromise Assessments Despite extensive guidance from national authorities, several prominent UK organizations have recently suffered significant cyber attacks.…
Apple Linux Malware Network Vulnerabilities3 Min Read August 28, 2025 CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors The U.S. Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI, and a broad coalition of international partners, has…
Artificial Intelligence Malware3 Min Read August 28, 2025 U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions against two…
Cloud Security Malware Ransomware Windows4 Min Read August 28, 2025 Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure A threat actor has destroyed data and backups following exfiltration in a victim’s Microsoft Azure environment in a novel cloud-based…
Malware3 Min Read August 28, 2025 ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia…
Malware Threat Intelligence3 Min Read August 28, 2025 Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…
Data Breach Malware Phishing Ransomware2 Min Read August 28, 2025 ShadowSilk Campaign Targets Central Asian Governments A series of cyber-attacks against government organizations in Central Asia and the Asia-Pacific has been linked to a threat cluster known as…
Malware Vulnerabilities3 Min Read August 28, 2025 Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation Citrix has released patches for three zero-day vulnerabilities in NetScaler ADC and Gateway, one of which was already being exploited by…
Malware Ransomware Vulnerabilities Windows4 Min Read August 28, 2025 Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an…
Apple Malware Ransomware Vulnerabilities4 Min Read August 28, 2025 Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day…
Apple Linux Malware Vulnerabilities Windows2 Min Read August 28, 2025 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158 Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which…
Android Data Breach Malware Phishing Ransomware Windows4 Min Read August 27, 2025 HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
Android Malware Phishing Ransomware2 Min Read August 27, 2025 New Android Trojan Variant Expands with Ransomware Tactics A new version of the Hook Android banking Trojan has surfaced, showcasing one of the most extensive feature sets ever recorded for mobile…
Malware Network Phishing2 Min Read August 27, 2025 Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools A global phishing campaign using personalized emails and fake websites to deliver malicious downloads has been identified by cybersecurity…
DDoS Malware Network Vulnerabilities2 Min Read August 27, 2025 CISA Adds Citrix Vulnerabilities to KEV Catalog as New Flaws Emerge The U.S. Cybersecurity and Information Security Agency (CISA) has added two Citrix vulnerabilities to its Known Exploited Vulnerabilities…
DDoS Malware Ransomware Vulnerabilities2 Min Read August 27, 2025 Citrix patches trio of NetScaler bugs – after attackers beat them to it Citrix has pushed out fixes for three fresh NetScaler holes – and yes, they’ve already been used in the wild before the vendor got…
Cloud Security Data Breach Malware Phishing Ransomware Vulnerabilities5 Min Read August 27, 2025 Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However,…
DDoS Malware Vulnerabilities2 Min Read August 27, 2025 NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775) Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of…
Malware Phishing4 Min Read August 27, 2025 Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving rapidly,…