Cyber Espionage Malware2 Min Read September 17, 2025 Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and…
Malware Phishing Ransomware Windows0 Min Read September 17, 2025 Microsoft Disrupts RaccoonO365 Phishing Kit, Seizes 338 Malicious Sites Microsoft has announced the disruption of RaccoonO365, a popular subscription-based phishing kit focused on the theft of Microsoft365…
Cloud Security Exploits Malware Vulnerabilities2 Min Read September 17, 2025 Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical vulnerabilities were identified in Chaos Mesh, a popular Cloud Native Computing Foundation chaos engineering platform used for fault…
Malware Phishing0 Min Read September 17, 2025 A Quarter of UK and US Firms Suffer Data Poisoning Attacks British and American cybersecurity leaders are increasingly concerned about their expanding AI attack surface, particularly unsanctioned use…
Cloud Security Malware Ransomware Supply Chain0 Min Read September 17, 2025 Shai-Hulud Worm Prowls npm to Steal Hundreds of Secrets For the third time in just a few weeks, experts are warning of a significant threat to the open source npm ecosystem, after discovering a…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Exploits ICS/OT Malware Ransomware8 Min Read September 16, 2025 Digital Transformation Failures: A National Security Crisis in the Making In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business…
Malware Social Engineering3 Min Read September 16, 2025 New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the…
Exploits Malware Network Vulnerabilities2 Min Read September 16, 2025 WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login A critical authentication bypass vulnerability in the Case Theme User WordPress plugin has emerged as a significant security threat, allowing…
Apple Malware Ransomware1 Min Read September 16, 2025 Apple Ends iCloud Support for Older Devices According to Apple’s newly published support documentation, devices running iOS 10 or macOS 10.12 no longer meet the minimum system…
DDoS Malware Ransomware Vulnerabilities0 Min Read September 16, 2025 API Threats Surge to 40,000 Incidents in 1H 2025 The financial services, telecoms and travel sectors were in the crosshairs of threat actors in the first half of the year, after Thales…
Exploits Linux Malware Vulnerabilities2 Min Read September 16, 2025 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities A 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities, achieving remote code execution on a two-year-out-of-date Linux 6.1.45…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Cyber Attack Malware2 Min Read September 16, 2025 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages…
Malware Network Security3 Min Read September 15, 2025 Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Malware Phishing Ransomware Vulnerabilities9 Min Read September 15, 2025 Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a…
Malware Phishing Ransomware Windows0 Min Read September 15, 2025 SEO Poisoning Targets Chinese Users with Fake Software Sites A search engine optimization (SEO) poisoning attack aimed at Chinese-speaking Microsoft Windows users has been identified by security…
Malware Phishing2 Min Read September 15, 2025 AI-Forged Military IDs Used in North Korean Phishing Attack A North Korean threat actor has leveraged AI to create fake South Korean military agency ID card images used in a spear-phishing campaign,…
Cloud Security Malware Ransomware Windows2 Min Read September 15, 2025 OpenAI’s New Grove Incubator Is Building the Next Generation of AI Startups OpenAI recently unveiled its internal incubation initiative, OpenAI Grove. Unlike traditional startup accelerators or incubator programs,…
Malware Phishing Ransomware Windows7 Min Read September 15, 2025 ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Malware Phishing Ransomware Windows3 Min Read September 15, 2025 Phishing Wave Hits U.S. Energy Giants: Chevron, ConocoPhillips Targeted The U.S. energy industry has become a prime target for large-scale phishing operations in 2025, according to new research from Hunt…
Apple Malware Vulnerabilities Windows3 Min Read September 13, 2025 Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Malware Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya attacks.…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 13, 2025 Microsoft Windows Defender Privilege Escalation Flaws It was an uneventful Patch Tuesday—until the headlines hit. Security feeds and vuln catalogs started buzzing: The Microsoft Windows…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
ConnectWise RAT Cyber Attack Cybersecurity Fraud Info Stealer Malware Muck Stealer Phishing Phishing Scam Security SimpleHelp RAT2 Min Read September 12, 2025 Muck Stealer Malware Used Alongside Phishing in New Attack Waves A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise…
Apple Exploits Malware Vulnerabilities2 Min Read September 12, 2025 France Warns Apple Users of New Spyware Campaign Apple recently issued a spyware campaign alert, according to the French Computer Emergency Response Team (CERT-FR). The national incident…
DDoS Malware Ransomware Vulnerabilities1 Min Read September 12, 2025 Apple Issues New Spyware Alerts for French Officials and Journalists Ddos September 12, 2025 Apple occasionally issues spyware attack notifications, publicly disclosing on its website which countries or regions…
Apple Malware Vulnerabilities2 Min Read September 11, 2025 Apple warns customers targeted in recent spyware attacks Apple warned customers last week that their devices were targeted in a new series of spyware attacks, according to the French…
Botnets Malware Windows2 Min Read September 11, 2025 Fileless Malware Deploys Advanced RAT via Legitimate Tools A sophisticated fileless malware campaign exploiting legitimate system tools has been uncovered by cybersecurity researchers. The attack…
Malware Phishing Ransomware Windows3 Min Read September 11, 2025 12 Ways to Protect Your Business from Hackers During Remote Work Michelle MooreUniversity of San Diego’sSeptember 11, 2025 Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%)…
Malware Ransomware Windows2 Min Read September 11, 2025 Wyden Urges FTC Investigation Over Ascension Ransomware Hack US Senator Ron Wyden of Oregon has called on the Federal Trade Commission to investigate Microsoft for cybersecurity lapses linked to…
Botnets Malware Vulnerabilities Windows3 Min Read September 11, 2025 Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset A Chinese APT group has compromised a Philippines-based military firm using a novel, sophisticated fileless malware framework dubbed…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
DDoS Exploits Malware Vulnerabilities2 Min Read September 11, 2025 NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an…
Malware Ransomware2 Min Read September 11, 2025 Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted A 28-year-old Ukrainian has been added to a list of Europe’s most wanted fugitives for alleged participation in LockerGoga ransomware attacks.…
Credential Theft Malware2 Min Read September 11, 2025 AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring…