Data Breach Malware Vulnerabilities Windows8 Min Read September 28, 2025 Prompt Injection and Model Poisoning: The New Plagues of AI Security You wake up. Your AI wakes up. Somewhere, a stranger types a sentence, and your AI listens. This is not science fiction. This is the…
Malware Phishing Ransomware3 Min Read September 28, 2025 AsyncRAT Malware Campaign Found Targeting South American Hotels A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of…
Malware Phishing Vulnerabilities Windows5 Min Read September 28, 2025 Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How Juventus protects fans,…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…
Malware Ransomware Vulnerabilities Windows5 Min Read September 27, 2025 Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June…
DDoS Linux Malware Vulnerabilities2 Min Read September 27, 2025 New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices…
Malware Vulnerabilities Windows2 Min Read September 27, 2025 ChatGPT Pulse Arrives: The Proactive AI Assistant That Reshapes Your Morning Routine OpenAI has introduced a new feature within ChatGPT called “ChatGPT Pulse”, a service designed to deliver personalized daily…
Cryptocurrency Malware2 Min Read September 26, 2025 Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to…
Facebook Fraud Google Malware Scam Security TradingView2 Min Read September 26, 2025 Google Ads Used to Spread Trojan Disguised as TradingView Premium A malicious advertising campaign that has been tricking content creators and unsuspecting users into downloading harmful software by offering…
Malware Vulnerabilities2 Min Read September 26, 2025 Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035) CVE-2025-10035, a perfect CVSS 10.0 vulnerability in the Fortra GoAnywhere managed file transfer solution, has apparently been exploited in…
Apple Malware Ransomware Vulnerabilities3 Min Read September 26, 2025 ‘An attacker's playground:’ Crims exploit GoAnywhere perfect-10 bug Security researchers have confirmed that threat actors have exploited the maximum-severity vulnerability affecting Fortra's GoAnywhere managed…
Amatera Stealer Crypto Cryptojacking Cybersecurity Malware Phishing Phishing Scam Police PureMiner Security SVG Ukraine2 Min Read September 26, 2025 Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner Hackers are distributing malicious emails that imitate official notices from the National Police of Ukraine. This phishing campaign,…
Apple Malware Network Vulnerabilities2 Min Read September 26, 2025 Critical Cisco SSL VPN Vulnerabilities The cybersecurity world is on alert after multiple critical vulnerabilities were discovered in Cisco SSL VPN solutions, specifically affecting…
Malware Ransomware Vulnerabilities Windows2 Min Read September 26, 2025 Fortra GoAnywhere Vulnerability Exploited as 0-Day Before Patch A critical, perfect 10.0 CVSS score vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution was actively exploited as…
Malware Network Ransomware Vulnerabilities3 Min Read September 26, 2025 Agencies Around the Globe Urge Patching of Cisco ASA Bug Under Active Exploit The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-03 in response to an ongoing and severe…
Data Breach Malware4 Min Read September 26, 2025 New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed…
Apple Malware Network Vulnerabilities3 Min Read September 26, 2025 Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been…
Malware Network Ransomware Vulnerabilities4 Min Read September 26, 2025 ArcaneDoor Threat Actor Resurfaces in Continued Attacks Against Cisco Firewalls A newly identified cyber-attack campaign has exploited Cisco Adaptive Security Appliance (ASA) devices in a sophisticated operation linked to…
Exploits Malware Network Vulnerabilities2 Min Read September 26, 2025 CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day…
Apple Malware Ransomware Vulnerabilities3 Min Read September 26, 2025 Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data In late 2024, a new wave of cyber espionage emerged targeting global telecommunications infrastructure. Operating under the moniker Salt…
Apple Malware Network Vulnerabilities2 Min Read September 26, 2025 UK and US security agencies order urgent fixes as Cisco firewall bugs exploited in wild Cybersecurity agencies on both sides of the Atlantic are sounding the alarm over Cisco firewall vulnerabilities that are being exploited by an…
Browser Security Malware2 Min Read September 26, 2025 New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in limited…
DDoS Malware Vulnerabilities Windows2 Min Read September 26, 2025 Rack Security Update: High-Severity Flaw Bypasses Parameter Limit, Exposing Apps to DoS Attacks The Rack project, a key Ruby library providing a minimal and modular interface for web application development, has released a update…
Data Breach Malware Ransomware Windows3 Min Read September 26, 2025 New LockBit Ransomware Variant Emerges as Most Dangerous Yet Trend Micro has identified a new LockBit ransomware variant that is “significantly more dangerous” than previous versions and is being…
Cofense Copyright Cryptocurrency Cyber Attack Cybersecurity Infostealer Lone None Lone None Stealer Malware Pure Logs Stealer Scam Security Telegram Vietnam2 Min Read September 25, 2025 Vietnamese Hackers Use Fake Copyright Notices to Spread Lone None Stealer A Vietnamese hacking group known as Lone None is running an online scam campaign that has been active since at least November 2024. The…
Botnets Exploits Malware Vulnerabilities3 Min Read September 25, 2025 Malicious AI Agent Server Reportedly Steals Emails A popular Model Context Protocol (MCP) server used to deploy AI agents has turned malicious in one of its latest updates, according to Koi…
Botnets Malware Phishing Windows2 Min Read September 25, 2025 Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment…
Cryptocurrency Malware5 Min Read September 25, 2025 North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented…
Malware Ransomware Vulnerabilities Windows3 Min Read September 25, 2025 Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms Chinese cyber threat actors are suspected of deploying a recently identified backdoor to get a foothold into the systems of US organizations…
BRICKSTORM China Cyber Attack Cybersecurity Google Linux Malware Mandiant SaaS Security UNC5221 Vulnerability3 Min Read September 25, 2025 China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity researchers at…
Malware Software Security2 Min Read September 25, 2025 Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and…
Apple DDoS Malware Vulnerabilities2 Min Read September 25, 2025 Cisco SNMP Flaw (CVE-2025-20352) Actively Exploited: Patch Now to Stop Root Access! Cisco has issued a security advisory warning of a critical flaw in its IOS and IOS XE Software, tracked as CVE-2025-20352 with a CVSS score of…
Botnets Email Security Malware2 Min Read September 25, 2025 Hidden Backdoors in WordPress: How Attackers Use Fake Plugins and Core Files for Persistent Access Security researcher Puja Srivastava from Sucuri uncovered two malicious files designed to guarantee persistent attacker access by manipulating…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 25, 2025 ShadowV2: How a New DDoS Botnet Mimics Cloud-Native Apps The login UI | Image: Darktrace Researchers at Darktrace have identified a sophisticated new campaign that merges traditional malware…
Malware Ransomware Supply Chain2 Min Read September 24, 2025 npm Package Uses QR Code Steganography to Steal Credentials A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a QR code as part…
Cloud Security DDoS Malware Ransomware2 Min Read September 24, 2025 ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms A new campaign that combines traditional malware with modern DevOps tooling has been observed by cybersecurity analysts. The ShadowV2 DDoS…
Linux Malware Vulnerabilities Windows5 Min Read September 24, 2025 Google warns China-linked spies lurking in 'numerous' enterprises since March Unknown intruders – likely China-linked spies – have broken into "numerous" enterprise networks since March and deployed…
DDoS Malware Nation-state Ransomware4 Min Read September 24, 2025 Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence) Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the…
Malware Windows Security3 Min Read September 24, 2025 New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share "significant" source…
Exploits Malware Vulnerabilities2 Min Read September 24, 2025 Supermicro server motherboards can be infected with unremovable malware Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious…
Malware Nation-state Network Ransomware2 Min Read September 24, 2025 Cisco Uncovers New PlugX Backdoor Linked to Chinese APTs Researchers at Cisco Talos have uncovered a long-running espionage campaign active since 2022, targeting the telecommunications and…
Malware Network Ransomware Vulnerabilities2 Min Read September 23, 2025 SonicWall releases rootkit-busting firmware update following wave of attacks SonicWall on Monday released a firmware update that the security vendor says will remove rootkit malware deployed in recent attacks targeting…