Cyber Espionage Malware3 Min Read August 26, 2025 UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities…
Cloud Security Malware4 Min Read August 26, 2025 Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware…
Malware Ransomware Windows2 Min Read August 26, 2025 Onderzoeker: ransomware-aanval op telecombedrijf Colt via SharePoint-server De ransomware-aanval op het Britse telecombedrijf Colt heeft plaatsgevonden via een gecompromitteerde SharePoint-server, zo stelt…
August 26, 2025 Ten Years of Resilience, Innovation & Community-Driven Defense The world of cybersecurity has been a wild ride over the last decade. As attackers stepped up their game year over year, the security…
Malware Network Phishing Ransomware Vulnerabilities Windows2 Min Read August 26, 2025 Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging…
August 25, 2025 MURKY PANDA: A Trusted-Relationship Threat in the Cloud Since late 2024, CrowdStrike Counter Adversary Operations has observed significant activity conducted by MURKY PANDA, a China-nexus adversary…
Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Apple Malware Ransomware2 Min Read August 25, 2025 Fake macOS Help Sites Seek to Spread Infostealer in Targeted Campaign A sophisticated malvertising campaign which sought to deploy a variant of Atomic macOS Stealer (AMOS) has targeted hundreds of…
Cybercrime Malware2 Min Read August 25, 2025 Chinese Developer Jailed for Deploying Malicious Code at US Company A Chinese software developer has been sentenced after being convicted of causing intentional damage to protected computers by deploying…
Malware Zero Trust4 Min Read August 25, 2025 Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks…
Cyber Attack Malware3 Min Read August 25, 2025 Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating…
Malware4 Min Read August 25, 2025 Watering Hole Attacks Push ScanBox Keylogger Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based…
Malware2 Min Read August 25, 2025 Ransomware Attacks are on the Rise Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. After a recent dip,…
Malware3 Min Read August 25, 2025 Fake Reservation Links Prey on Weary Travelers Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked…
Linux Malware2 Min Read August 25, 2025 Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and…
Cyber Attack Malware3 Min Read August 25, 2025 New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access…
Enterprise Security Malware2 Min Read August 25, 2025 Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated delivery mechanisms to deploy the…
Malware Supply Chain Attack3 Min Read August 25, 2025 Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior…
Android Malware2 Min Read August 25, 2025 ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in…
Malware Vulnerability3 Min Read August 25, 2025 Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw impacting Microsoft Windows to deliver malicious…
Malware Open Source3 Min Read August 25, 2025 Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure entities in Taiwan using customized…
Apple Malware2 Min Read August 25, 2025 Apple Releases Patch for Likely Exploited Zero-Day Vulnerability In a series of updates for its iOS, iPadOS, and macOS operating systems, Apple released a patch for a previously unknown vulnerability that…
Apple Malware3 Min Read August 25, 2025 Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw A seven-year-old vulnerability affecting end-of-life Cisco network devices is being exploited by a Russian state-sponsored cyber espionage…
Cloud Security Malware2 Min Read August 25, 2025 Oregon Man Charged in Rapper Bot DDoS-for-Hire Case A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire botnet, which was allegedly used to launch…
Malware3 Min Read August 25, 2025 “PromptFix” Attacks Could Supercharge Agentic AI Threats Researchers have engineered a new version of the ClickFix social engineering technique using prompt injection to trick agentic AI into…
Cloud Security Malware Ransomware Windows6 Min Read August 14, 2025 Datadog threat roundup: Top insights for Q2 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…
Cloud Security Malware Ransomware Vulnerabilities10 Min Read July 21, 2025 Beyond Mimo’lette: Tracking Mimo's Expansion to Magento CMS and Docker Executive summary Through investigations into a string of workload compromises involving ecommerce sites, the Datadog Security Research team…
Cloud Security Malware Ransomware Vulnerabilities24 Min Read July 16, 2025 I SPy: Escalating to Entra ID's Global Admin with a first-party app This research was presented at fwd:cloudsec North America on June 30th, 2025. You can find the talk here. Key points Service principals (SPs)…
Malware Network Ransomware Windows12 Min Read May 21, 2025 The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions Key points and observations Datadog Security Research discovered three malicious VS Code extensions that target Solidity developers on…
Exploits Linux Malware Ransomware8 Min Read May 7, 2025 RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale Key points and observations Datadog Security Research has discovered a new Linux cryptojacking campaign, named RedisRaider, targeting publicly…
Cloud Security Malware Phishing Ransomware11 Min Read April 17, 2025 Datadog threat roundup: Top insights for Q1 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…