Data Breach Malware Ransomware Windows2 Min Read October 7, 2025 Qilin Ransomware Gang Claims Asahi Cyber-Attack The Qilin ransomware group has claimed responsibility for the cyber-attack on Japan’s Asahi Group and says it has stolen sensitive data…
Malware Threat Intelligence2 Min Read October 7, 2025 BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job…
Malware Network Ransomware Vulnerabilities5 Min Read October 7, 2025 CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882) CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now tracked as…
Malware Network Ransomware Vulnerabilities2 Min Read October 7, 2025 Critical Flaw Exposes 60,000 Redis Servers to Remote Exploitation A critical security flaw in Redis, a popular in-memory database platform used by about 75% of cloud environments, has left an estimated 60,000…
Malware Phishing Ransomware2 Min Read October 7, 2025 Qilin Claims Ransomware Attack on Mecklenburg Schools A ransomware attack that disrupted operations at Mecklenburg County Public Schools (MCPS) in early September has been claimed by the Russian…
Exploits Malware Vulnerabilities2 Min Read October 7, 2025 Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844) Redis, the company behind the widely used in-memory data structure store of the same name, has released patches for a critical vulnerability…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 7, 2025 CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as…
Data Breach Malware Phishing Ransomware9 Min Read October 7, 2025 Security in AI Era: Protecting AI Workloads with Google Cloud Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, along with…
Exploits Malware Supply Chain Vulnerabilities3 Min Read October 7, 2025 Researchers Uncover 13-Year-Old Redis Flaw Impacting Nearly 330,000 Instances Researchers have uncovered a 13-year-old critical remote-code-execution flaw in Redis that let attackers escape the product’s Lua…
C2 command-and-control DDoS Malware Phishing Ransomware rce Stealer TROJAN Windows2 Min Read October 7, 2025 XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
Botnet Cryptojacking cve-2025-49844 exploit Malware rce2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
C2 CloudFlare command-and-control CVE-2025-10035 exploit Malware Microsoft Ransomware rce Windows2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
Android Malware ProSpy Scam Security Signal Social Engineering Spyware ToSpy ToTok UAE2 Min Read October 6, 2025 Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users If you use messaging apps in the United Arab Emirates (UAE), cybersecurity researchers at ESET have identified two mobile spyware campaigns…
backdoor Botnet cve-2025-49844 exploit Malware Microsoft Ransomware3 Min Read October 6, 2025 Redis warns of critical flaw impacting thousands of instances The Redis security team has released patches for a maximum severity vulnerability that could allow attackers to gain remote code execution on…
Android Malware Mobile TROJAN VPN3 Min Read October 6, 2025 New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Android Apple backdoor C2 Cisco command-and-control Malware Microsoft Mobile VPN Windows2 Min Read October 6, 2025 Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine…
Akira Cisco conti exploit firewall Malware Palo Alto Ransomware Social Engineering VPN2 Min Read October 6, 2025 Scanning of Palo Alto Portals Surges 500% Security experts have observed a massive increase in reconnaissance activity targeted at login portals for Palo Alto Networks products.…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Botnet Malware4 Min Read October 3, 2025 Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's…
ICS/OT Malware Ransomware Vulnerabilities2 Min Read October 3, 2025 Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns The cybersecurity firm Bitsight has issued a major warning about a rapid increase in critical systems left vulnerable on the public internet.…
Cybercrime Malware4 Min Read October 3, 2025 Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as…
Insider Threats Malware Ransomware5 Min Read October 3, 2025 AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real…
Android Apple Malware Vulnerabilities2 Min Read October 3, 2025 Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to…
Malware Online Security2 Min Read October 3, 2025 Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The…
Cybersecurity Malware3 Min Read October 3, 2025 New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT A threat actor that's known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 3, 2025 Google Announces $4 Billion Arkansas Investment for New AI Data Center and 600 MW Solar Project Google has announced plans to invest up to $4 billion in Arkansas by 2027, channeling resources into infrastructure, energy transition, and…
Malware Vulnerabilities2 Min Read October 3, 2025 Actively Exploited: Critical Flaw CVE-2025-6388 (CVSS 9.8) Allows Authentication Bypass in WordPress Plugin A newly disclosed in the Spirit Framework plugin for WordPress has put thousands of websites at immediate risk of compromise. Tracked as…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Cyber Espionage Malware2 Min Read October 2, 2025 Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like…
Malware Phishing Ransomware Windows2 Min Read October 2, 2025 Confucius Shifts from Document Stealers to Python Backdoors A long-running cyber-espionage group known as Confucius has introduced new techniques in its campaigns against Microsoft Windows users. First…
Malware Python3 Min Read October 2, 2025 Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to…
Blackpoint Cyber Cyber Attack Cybersecurity Fraud Malware Phishing Phishing Scam PowerShell Scam Security Windows3 Min Read October 2, 2025 Malicious ZIP Files Use Windows Shortcuts to Drop Malware A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’ trust…
Malware Mobile Security4 Min Read October 2, 2025 Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…
DDoS Malware Phishing Ransomware2 Min Read October 2, 2025 Phishing Dominates EU-Wide Intrusions, says ENISA Phishing and vulnerability exploitation accounted for the vast majority of initial access in cyber-attacks against EU organizations over the…
Malware Phishing Vulnerabilities Windows2 Min Read October 2, 2025 Critical Flaw in Termix Docker Image (CVE-2025-59951) Leaks SSH Credentials Without Authentication The Termix project has disclosed a critical authentication bypass in its official Docker image, exposing sensitive SSH configuration data…
DDoS Malware Network Vulnerabilities2 Min Read October 2, 2025 Critical Flaw CVE-2025-52906 (CVSS 9.3) Allows Unauthenticated RCE on TOTOLINK X6000R Routers Researchers from Unit 42, Palo Alto Networks’ threat intelligence team, have disclosed three newly discovered in the firmware of the…
Cyber Attack Cyber Crime Cybersecurity Detour Dog DNS Infostealer Los Pollos Malware Security Strela Stealer2 Min Read October 1, 2025 Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer New research from Infoblox Threat Intel has revealed that an established, persistent group of cybercriminals, Detour Dog, has been silently…
Malware Vulnerability2 Min Read October 1, 2025 Hackers Exploit Milesight Routers to Send Phishing SMS to European Users Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in…
Apple Malware Network Vulnerabilities2 Min Read October 1, 2025 Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and…