Malware Phishing Ransomware Windows7 Min Read September 15, 2025 ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Malware Phishing Ransomware Windows3 Min Read September 15, 2025 Phishing Wave Hits U.S. Energy Giants: Chevron, ConocoPhillips Targeted The U.S. energy industry has become a prime target for large-scale phishing operations in 2025, according to new research from Hunt…
Apple Malware Vulnerabilities Windows3 Min Read September 13, 2025 Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Malware Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya attacks.…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 13, 2025 Microsoft Windows Defender Privilege Escalation Flaws It was an uneventful Patch Tuesday—until the headlines hit. Security feeds and vuln catalogs started buzzing: The Microsoft Windows…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
ConnectWise RAT Cyber Attack Cybersecurity Fraud Info Stealer Malware Muck Stealer Phishing Phishing Scam Security SimpleHelp RAT2 Min Read September 12, 2025 Muck Stealer Malware Used Alongside Phishing in New Attack Waves A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise…
Apple Exploits Malware Vulnerabilities2 Min Read September 12, 2025 France Warns Apple Users of New Spyware Campaign Apple recently issued a spyware campaign alert, according to the French Computer Emergency Response Team (CERT-FR). The national incident…
DDoS Malware Ransomware Vulnerabilities1 Min Read September 12, 2025 Apple Issues New Spyware Alerts for French Officials and Journalists Ddos September 12, 2025 Apple occasionally issues spyware attack notifications, publicly disclosing on its website which countries or regions…
Apple Malware Vulnerabilities2 Min Read September 11, 2025 Apple warns customers targeted in recent spyware attacks Apple warned customers last week that their devices were targeted in a new series of spyware attacks, according to the French…
Botnets Malware Windows2 Min Read September 11, 2025 Fileless Malware Deploys Advanced RAT via Legitimate Tools A sophisticated fileless malware campaign exploiting legitimate system tools has been uncovered by cybersecurity researchers. The attack…
Malware Phishing Ransomware Windows3 Min Read September 11, 2025 12 Ways to Protect Your Business from Hackers During Remote Work Michelle MooreUniversity of San Diego’sSeptember 11, 2025 Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%)…
Malware Ransomware Windows2 Min Read September 11, 2025 Wyden Urges FTC Investigation Over Ascension Ransomware Hack US Senator Ron Wyden of Oregon has called on the Federal Trade Commission to investigate Microsoft for cybersecurity lapses linked to…
Botnets Malware Vulnerabilities Windows3 Min Read September 11, 2025 Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset A Chinese APT group has compromised a Philippines-based military firm using a novel, sophisticated fileless malware framework dubbed…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
DDoS Exploits Malware Vulnerabilities2 Min Read September 11, 2025 NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an…
Malware Ransomware2 Min Read September 11, 2025 Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted A 28-year-old Ukrainian has been added to a list of Europe’s most wanted fugitives for alleged participation in LockerGoga ransomware attacks.…
Credential Theft Malware2 Min Read September 11, 2025 AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 11, 2025 Beyond Cobalt Strike: A New Open-Source Hacking Tool Is on the Rise Ddos September 11, 2025 Researchers at Palo Alto Networks’ Unit 42 have published a report detailing the rise of AdaptixC2, an open-source…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 11, 2025 ACSC Warns of Active Exploitation of SonicWall SSL VPN Vulnerability (CVE-2024-40766) Ddos September 11, 2025 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an alert on the active…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…
AsyncRAT Cyber Attack Cybersecurity Fileless Malware ScreenConnect Security SentinelOne TROJAN2 Min Read September 10, 2025 New Fileless Malware Attack Uses AsyncRAT for Credential Theft LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote Access…
Cybersecurity Malware3 Min Read September 10, 2025 Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a…
Malware Threat Intelligence3 Min Read September 10, 2025 CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based…
Malware Phishing Ransomware5 Min Read September 10, 2025 Using Artificial Intelligence for Strengthening Email Security Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use,…
Apple Malware Windows2 Min Read September 10, 2025 Cursor Autorun Flaw Lets Repositories Execute Code Without Consent A newly disclosed flaw in the Cursor extension allows repositories to automatically execute code when a folder is opened, even without a…
Data Breach Malware Network Vulnerabilities2 Min Read September 10, 2025 Adobe Releases Emergency Patch for Critical Flaw in Commerce and Magento Threat researchers from the Sansec Forensics Team have warned about a critical vulnerability in Adobe Commerce and Magento, an open-source…
Android Apple DDoS Malware Ransomware Windows3 Min Read September 10, 2025 Apple’s “Most Significant Upgrade” to iPhone Security Is Here Ddos September 10, 2025 Apple Security Engineering and Architecture (SEAR) has unveiled Memory Integrity Enforcement (MIE), an always-on,…
Cyber Espionage Malware3 Min Read September 10, 2025 China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations The House Select Committee on China has formally issued an advisory warning of an “ongoing” series of highly targeted cyber…
DDoS Linux Malware Phishing Vulnerabilities Windows2 Min Read September 10, 2025 Two Zero-Days Among Patch Tuesday CVEs This Month Microsoft issued updates to fix 81 vulnerabilities in this month’s Patch Tuesday yesterday, including two classed as zero-days which…
Malware Ransomware2 Min Read September 10, 2025 Malicious npm Code Reached 10% of Cloud Environments Security experts have warned that a newly discovered supply chain attack targeting npm packages is still active and may already have…
Malware Network Vulnerabilities2 Min Read September 10, 2025 Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System A critical vulnerability CVE-2025-42922 has been discovered in SAP NetWeaver that allows an authenticated, low-privileged attacker to execute…
DDoS Malware Vulnerabilities2 Min Read September 10, 2025 Sophos Fixes Critical Authentication Bypass (CVE-2025-10159) in AP6 Series Wireless Access Points Ddos September 10, 2025 Sophos has released a fix for a critical authentication bypass vulnerability (CVE-2025-10159) affecting its AP6 Series…
Android Apple Linux Malware Ransomware Vulnerabilities Windows3 Min Read September 9, 2025 Microsoft Patch Tuesday, September 2025 Edition Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no…
Malware Phishing Ransomware Vulnerabilities1 Min Read September 9, 2025 As hackers exploit one high-severity SAP flaw, company warns of 3 more SecurityBridge warned that CVE-2025-42957 allowed hackers with minimal system rights to mount “a complete system compromise with minimal…
Malware Phishing2 Min Read September 9, 2025 Threat Actor Accidentally Exposes AI-Powered Operations A threat actor has unintentionally revealed their methods and day-to-day activities after installing Huntress security software on their own…
Linux Malware Network Ransomware7 Min Read September 9, 2025 Software Supply Chain Attacks In today’s rapidly evolving business landscape, software supply chain attacks are becoming increasingly common—and more…
Malware Ransomware4 Min Read September 9, 2025 Open Source Community Thwarts Massive npm Supply Chain Attack A potential npm supply chain disaster was averted in record time after attackers took over a verified developer’s credentials. On September 8,…