DDoS Malware Ransomware Vulnerabilities3 Min Read September 25, 2025 ShadowV2: How a New DDoS Botnet Mimics Cloud-Native Apps The login UI | Image: Darktrace Researchers at Darktrace have identified a sophisticated new campaign that merges traditional malware…
Malware Ransomware Supply Chain2 Min Read September 24, 2025 npm Package Uses QR Code Steganography to Steal Credentials A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a QR code as part…
Cloud Security DDoS Malware Ransomware2 Min Read September 24, 2025 ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms A new campaign that combines traditional malware with modern DevOps tooling has been observed by cybersecurity analysts. The ShadowV2 DDoS…
Linux Malware Vulnerabilities Windows5 Min Read September 24, 2025 Google warns China-linked spies lurking in 'numerous' enterprises since March Unknown intruders – likely China-linked spies – have broken into "numerous" enterprise networks since March and deployed…
DDoS Malware Nation-state Ransomware4 Min Read September 24, 2025 Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence) Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the…
Malware Windows Security3 Min Read September 24, 2025 New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share "significant" source…
Exploits Malware Vulnerabilities2 Min Read September 24, 2025 Supermicro server motherboards can be infected with unremovable malware Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious…
Malware Nation-state Network Ransomware2 Min Read September 24, 2025 Cisco Uncovers New PlugX Backdoor Linked to Chinese APTs Researchers at Cisco Talos have uncovered a long-running espionage campaign active since 2022, targeting the telecommunications and…
Malware Network Ransomware Vulnerabilities2 Min Read September 23, 2025 SonicWall releases rootkit-busting firmware update following wave of attacks SonicWall on Monday released a firmware update that the security vendor says will remove rootkit malware deployed in recent attacks targeting…
Malware Ransomware Vulnerabilities Windows3 Min Read September 23, 2025 22 Vulnerabilities Under Attack – And Another That Could Be Cyble researchers detailed 22 vulnerabilities under active attack in a blog post today – and nine of them aren’t in CISA’s…
Cloud Security Malware Supply Chain Vulnerabilities2 Min Read September 23, 2025 Third time's the charm? SolarWinds (again) patches critical Web Help Desk RCE SolarWinds on Tuesday released a hotfix - again - for a critical, 9.8-severity flaw in its Web Help Desk IT ticketing software that could…
Cloud Security Malware Phishing Windows2 Min Read September 23, 2025 Iranian Hacking Group Nimbus Manticore Expands European Targeting A long-running cyber-espionage campaign tied to Iran has intensified its operations in Europe. The group, known as Nimbus Manticore, has a…
Malware Network Ransomware Vulnerabilities2 Min Read September 23, 2025 SonicWall Releases Urgent Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices SonicWall has issued an urgent firmware update, version 10.2.2.2-92sv, for its Secure Mobile Access (SMA) 100 series appliances to detect and…
Breach and Attack CISO Malware Press Release Report Research5 Min Read September 23, 2025 SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist Austin, Texas, USA, September 23rd, 2025, CyberNewsWire New SpyCloud 2025 Identity Threat Report reveals dangerous disconnect between…
Exploits Malware Phishing Ransomware2 Min Read September 23, 2025 Attacker Breakout Time Falls to 18 Minutes Threat actors are accelerating their attacks and adopting innovative new ways to circumvent endpoint detection mechanisms, according to a new…
Malware Supply Chain Attack3 Min Read September 23, 2025 GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent…
Malware SEO Poisoning3 Min Read September 23, 2025 BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a…
Botnets Malware Supply Chain Windows2 Min Read September 23, 2025 BlockBlasters: When a Steam Game Turns Into a Malware Delivery Vehicle What began as a promising indie platformer has turned into one of the most alarming cases of malware-laced games on Steam in 2025. According…
Data Breach Malware Ransomware Windows3 Min Read September 23, 2025 Kawa4096: A New Ransomware Group with Akira-Style Branding and Qilin-Like Notes In June 2025, a new ransomware group known as Kawa4096 surfaced, launching disruptive attacks against multinational organizations in finance,…
Malware Phishing Vulnerabilities Windows2 Min Read September 23, 2025 Beyond Trust: A New Campaign Is Using a Legitimate Tool to Deliver RATs A new report from Hunt Intelligence reveals how attackers are abusing ConnectWise ScreenConnect (formerly ConnectWise Control) to deliver…
Data Breach Malware Ransomware Vulnerabilities4 Min Read September 22, 2025 VMScape attack | Kaspersky official blog A team of researchers at the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has published a research paper demonstrating how a…
Cloud Security Malware Phishing Ransomware4 Min Read September 22, 2025 Organizations Must Update Defenses to Scattered Spider Tactics, Experts Urge Organizations must urgently update their defenses to protect against tactics deployed by the Scattered Spider hacking collective this year,…
Data Theft Malware3 Min Read September 22, 2025 ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented…
Malware Network Ransomware Windows6 Min Read September 22, 2025 Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE’s annual endpoint detection and…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Exploits Malware Phishing Ransomware4 Min Read September 21, 2025 Countering The Adaptive Playbook of Modern Threat Actors The cybersecurity landscape has seen a substantial threat vector transformation. While malware and ransomware continue to be relevant threats,…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
DDoS Malware Ransomware Vulnerabilities7 Min Read September 20, 2025 Top Zero-Day Vulnerabilities Exploited in the Wild in 2025 The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.…
Malware Software Security2 Min Read September 20, 2025 LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that…
Artificial Intelligence Malware3 Min Read September 20, 2025 Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Cybersecurity researchers have discovered what they say is the earliest example known to date of a malware with that bakes in Large Language…
Malware Ransomware Vulnerabilities Windows14 Min Read September 20, 2025 WannaCry Ransomware: A DFIR & SOC Monitoring Lab Walkthrough Hello fellow defenders, I hope you are having a great day. In this article, I’m going to show you how you can make a cybersecurity home…
Exploits Malware Mobile Security Vulnerabilities2 Min Read September 19, 2025 Ivanti EPMM holes let miscreants plant shady listeners, CISA says An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed…
Malware Phishing Ransomware Vulnerabilities4 Min Read September 19, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 38 The Good | Federal Courts Crack Down on BreachForums & UNC3944 Cybercrime Operators Conor Brian Fitzpatrick, the 22-year-old operator of…
Exploits Malware Ransomware Vulnerabilities3 Min Read September 19, 2025 CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding sophisticated malware campaigns targeting…
Malware2 Min Read September 19, 2025 Russian State Hackers Collaborate in Attacks Against Ukraine Two Russian state-linked threat actors, Gamaredon and Turla, are working together to compromise high-value defense targets in Ukraine,…
Cyber Espionage Malware4 Min Read September 19, 2025 Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine Cybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating together to target and…
Exploits Malware Ransomware Vulnerabilities4 Min Read September 19, 2025 CISA Warns of New Malware Campaign Exploiting Ivanti EPMM Vulnerabilities The Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR), highlighting a new attack trend…
Malware Phishing Vulnerabilities Windows2 Min Read September 19, 2025 CVE-2025-59340: Critical HubSpot’s Jinjava Engine Flaw Exposes Thousands of Websites to RCE HubSpot has issued a security advisory regarding a critical flaw in its Jinjava template engine, which powers thousands of websites and…
Malware Mobile Security Phishing Vulnerabilities2 Min Read September 19, 2025 CISA Warns of Malicious Listener Malware Exploiting Ivanti Endpoint Manager Mobile The Cybersecurity and Infrastructure Security Agency (CISA) has published a new Malware Analysis Report (MAR) detailing how threat actors are…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 19, 2025 MuddyWater APT Shifts Tactics to Custom Malware Group-IB analysts have released new intelligence on MuddyWater, the Iranian state-sponsored APT linked to Tehran’s Ministry of…
Linux Malware Vulnerabilities Windows2 Min Read September 18, 2025 Google pushes emergency patch for Chrome 0-day – check your browser version now Google pushed an emergency patch for a high-severity Chrome flaw, already under active exploitation. So it's time to make sure you're running…