Android Apple Exploits Malware0 Min Read September 18, 2025 1 in 3 Android Apps Leak Sensitive Data A significant share of mobile applications are exposing sensitive information through insecure APIs, leaving users and businesses vulnerable…
Cybercrime Malware3 Min Read September 18, 2025 CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to…
Malware Supply Chain Attack2 Min Read September 18, 2025 SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to…
AdTech Cyber Attack Cyber Crime Cybersecurity Fraud Malvertising Malware PropellerAds Russia Scams and Fraud Security Vane Viper3 Min Read September 18, 2025 Vane Viper Malvertising Network Posed as Legit Adtech in Global Scams Cybersecurity firm Infoblox says it has discovered “Vane Viper,” a massive online ad network that posed as a legitimate business…
ICS/OT IoT Security Malware Vulnerabilities2 Min Read September 18, 2025 Critical Vulnerabilities Discovered in Planet Technology Industrial Cellular Gateways The Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) has issued a security advisory warning of two critical…
Artificial Intelligence Malware3 Min Read September 17, 2025 TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT…
Cybersecurity Edge Lat61 Malware Point Wild Raven Stealer Security2 Min Read September 17, 2025 New Raven Stealer Malware Hits Browsers for Passwords and Payment Data A new sneaky type of malware, known as Raven Stealer, has been identified by the Lat61 Threat Intelligence Team at Point Wild. The research…
Exploits Malware Phishing Windows0 Min Read September 17, 2025 FileFix Campaign Using Steganography and Multistage Payloads A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted…
Malware Ransomware4 Min Read September 17, 2025 Deepfakes at the Gate: How Fake Job Applicants Are Becoming a Serious Cyber Threat In recent months, the hiring process has become a new attack surface. Cybercriminals are no longer just spoofing emails or exploiting software…
Cyber Espionage Malware2 Min Read September 17, 2025 Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and…
Malware Phishing Ransomware Windows0 Min Read September 17, 2025 Microsoft Disrupts RaccoonO365 Phishing Kit, Seizes 338 Malicious Sites Microsoft has announced the disruption of RaccoonO365, a popular subscription-based phishing kit focused on the theft of Microsoft365…
Cloud Security Exploits Malware Vulnerabilities2 Min Read September 17, 2025 Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical vulnerabilities were identified in Chaos Mesh, a popular Cloud Native Computing Foundation chaos engineering platform used for fault…
Malware Phishing0 Min Read September 17, 2025 A Quarter of UK and US Firms Suffer Data Poisoning Attacks British and American cybersecurity leaders are increasingly concerned about their expanding AI attack surface, particularly unsanctioned use…
Cloud Security Malware Ransomware Supply Chain0 Min Read September 17, 2025 Shai-Hulud Worm Prowls npm to Steal Hundreds of Secrets For the third time in just a few weeks, experts are warning of a significant threat to the open source npm ecosystem, after discovering a…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Exploits ICS/OT Malware Ransomware8 Min Read September 16, 2025 Digital Transformation Failures: A National Security Crisis in the Making In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business…
Malware Social Engineering3 Min Read September 16, 2025 New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the…
Exploits Malware Network Vulnerabilities2 Min Read September 16, 2025 WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login A critical authentication bypass vulnerability in the Case Theme User WordPress plugin has emerged as a significant security threat, allowing…
Apple Malware Ransomware1 Min Read September 16, 2025 Apple Ends iCloud Support for Older Devices According to Apple’s newly published support documentation, devices running iOS 10 or macOS 10.12 no longer meet the minimum system…
DDoS Malware Ransomware Vulnerabilities0 Min Read September 16, 2025 API Threats Surge to 40,000 Incidents in 1H 2025 The financial services, telecoms and travel sectors were in the crosshairs of threat actors in the first half of the year, after Thales…
Exploits Linux Malware Vulnerabilities2 Min Read September 16, 2025 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities A 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities, achieving remote code execution on a two-year-out-of-date Linux 6.1.45…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Cyber Attack Malware2 Min Read September 16, 2025 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages…
Malware Network Security3 Min Read September 15, 2025 Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Malware Phishing Ransomware Vulnerabilities9 Min Read September 15, 2025 Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a…
Malware Phishing Ransomware Windows0 Min Read September 15, 2025 SEO Poisoning Targets Chinese Users with Fake Software Sites A search engine optimization (SEO) poisoning attack aimed at Chinese-speaking Microsoft Windows users has been identified by security…
Malware Phishing2 Min Read September 15, 2025 AI-Forged Military IDs Used in North Korean Phishing Attack A North Korean threat actor has leveraged AI to create fake South Korean military agency ID card images used in a spear-phishing campaign,…
Cloud Security Malware Ransomware Windows2 Min Read September 15, 2025 OpenAI’s New Grove Incubator Is Building the Next Generation of AI Startups OpenAI recently unveiled its internal incubation initiative, OpenAI Grove. Unlike traditional startup accelerators or incubator programs,…
Malware Phishing Ransomware Windows7 Min Read September 15, 2025 ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Malware Phishing Ransomware Windows3 Min Read September 15, 2025 Phishing Wave Hits U.S. Energy Giants: Chevron, ConocoPhillips Targeted The U.S. energy industry has become a prime target for large-scale phishing operations in 2025, according to new research from Hunt…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Malware Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya attacks.…
Apple Malware Vulnerabilities Windows3 Min Read September 13, 2025 Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 13, 2025 Microsoft Windows Defender Privilege Escalation Flaws It was an uneventful Patch Tuesday—until the headlines hit. Security feeds and vuln catalogs started buzzing: The Microsoft Windows…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
ConnectWise RAT Cyber Attack Cybersecurity Fraud Info Stealer Malware Muck Stealer Phishing Phishing Scam Security SimpleHelp RAT2 Min Read September 12, 2025 Muck Stealer Malware Used Alongside Phishing in New Attack Waves A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise…
Apple Exploits Malware Vulnerabilities2 Min Read September 12, 2025 France Warns Apple Users of New Spyware Campaign Apple recently issued a spyware campaign alert, according to the French Computer Emergency Response Team (CERT-FR). The national incident…
DDoS Malware Ransomware Vulnerabilities1 Min Read September 12, 2025 Apple Issues New Spyware Alerts for French Officials and Journalists Ddos September 12, 2025 Apple occasionally issues spyware attack notifications, publicly disclosing on its website which countries or regions…