Apple Malware Vulnerabilities2 Min Read September 11, 2025 Apple warns customers targeted in recent spyware attacks Apple warned customers last week that their devices were targeted in a new series of spyware attacks, according to the French…
Botnets Malware Windows2 Min Read September 11, 2025 Fileless Malware Deploys Advanced RAT via Legitimate Tools A sophisticated fileless malware campaign exploiting legitimate system tools has been uncovered by cybersecurity researchers. The attack…
Malware Phishing Ransomware Windows3 Min Read September 11, 2025 12 Ways to Protect Your Business from Hackers During Remote Work Michelle MooreUniversity of San Diego’sSeptember 11, 2025 Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%)…
Malware Ransomware Windows2 Min Read September 11, 2025 Wyden Urges FTC Investigation Over Ascension Ransomware Hack US Senator Ron Wyden of Oregon has called on the Federal Trade Commission to investigate Microsoft for cybersecurity lapses linked to…
Botnets Malware Vulnerabilities Windows3 Min Read September 11, 2025 Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset A Chinese APT group has compromised a Philippines-based military firm using a novel, sophisticated fileless malware framework dubbed…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
DDoS Exploits Malware Vulnerabilities2 Min Read September 11, 2025 NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an…
Malware Ransomware2 Min Read September 11, 2025 Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted A 28-year-old Ukrainian has been added to a list of Europe’s most wanted fugitives for alleged participation in LockerGoga ransomware attacks.…
Credential Theft Malware2 Min Read September 11, 2025 AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 11, 2025 Beyond Cobalt Strike: A New Open-Source Hacking Tool Is on the Rise Ddos September 11, 2025 Researchers at Palo Alto Networks’ Unit 42 have published a report detailing the rise of AdaptixC2, an open-source…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 11, 2025 ACSC Warns of Active Exploitation of SonicWall SSL VPN Vulnerability (CVE-2024-40766) Ddos September 11, 2025 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an alert on the active…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…
AsyncRAT Cyber Attack Cybersecurity Fileless Malware ScreenConnect Security SentinelOne TROJAN2 Min Read September 10, 2025 New Fileless Malware Attack Uses AsyncRAT for Credential Theft LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote Access…
Cybersecurity Malware3 Min Read September 10, 2025 Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a…
Malware Threat Intelligence3 Min Read September 10, 2025 CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based…
Malware Phishing Ransomware5 Min Read September 10, 2025 Using Artificial Intelligence for Strengthening Email Security Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use,…
Apple Malware Windows2 Min Read September 10, 2025 Cursor Autorun Flaw Lets Repositories Execute Code Without Consent A newly disclosed flaw in the Cursor extension allows repositories to automatically execute code when a folder is opened, even without a…
Data Breach Malware Network Vulnerabilities2 Min Read September 10, 2025 Adobe Releases Emergency Patch for Critical Flaw in Commerce and Magento Threat researchers from the Sansec Forensics Team have warned about a critical vulnerability in Adobe Commerce and Magento, an open-source…
Android Apple DDoS Malware Ransomware Windows3 Min Read September 10, 2025 Apple’s “Most Significant Upgrade” to iPhone Security Is Here Ddos September 10, 2025 Apple Security Engineering and Architecture (SEAR) has unveiled Memory Integrity Enforcement (MIE), an always-on,…
Cyber Espionage Malware3 Min Read September 10, 2025 China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations The House Select Committee on China has formally issued an advisory warning of an “ongoing” series of highly targeted cyber…
DDoS Linux Malware Phishing Vulnerabilities Windows2 Min Read September 10, 2025 Two Zero-Days Among Patch Tuesday CVEs This Month Microsoft issued updates to fix 81 vulnerabilities in this month’s Patch Tuesday yesterday, including two classed as zero-days which…
Malware Ransomware2 Min Read September 10, 2025 Malicious npm Code Reached 10% of Cloud Environments Security experts have warned that a newly discovered supply chain attack targeting npm packages is still active and may already have…
Malware Network Vulnerabilities2 Min Read September 10, 2025 Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System A critical vulnerability CVE-2025-42922 has been discovered in SAP NetWeaver that allows an authenticated, low-privileged attacker to execute…
DDoS Malware Vulnerabilities2 Min Read September 10, 2025 Sophos Fixes Critical Authentication Bypass (CVE-2025-10159) in AP6 Series Wireless Access Points Ddos September 10, 2025 Sophos has released a fix for a critical authentication bypass vulnerability (CVE-2025-10159) affecting its AP6 Series…
Android Apple Linux Malware Ransomware Vulnerabilities Windows3 Min Read September 9, 2025 Microsoft Patch Tuesday, September 2025 Edition Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no…
Malware Phishing Ransomware Vulnerabilities1 Min Read September 9, 2025 As hackers exploit one high-severity SAP flaw, company warns of 3 more SecurityBridge warned that CVE-2025-42957 allowed hackers with minimal system rights to mount “a complete system compromise with minimal…
Malware Phishing2 Min Read September 9, 2025 Threat Actor Accidentally Exposes AI-Powered Operations A threat actor has unintentionally revealed their methods and day-to-day activities after installing Huntress security software on their own…
Linux Malware Network Ransomware7 Min Read September 9, 2025 Software Supply Chain Attacks In today’s rapidly evolving business landscape, software supply chain attacks are becoming increasingly common—and more…
Malware Ransomware4 Min Read September 9, 2025 Open Source Community Thwarts Massive npm Supply Chain Attack A potential npm supply chain disaster was averted in record time after attackers took over a verified developer’s credentials. On September 8,…
Malware Phishing Ransomware Windows2 Min Read September 9, 2025 Chinese Cyber Espionage Campaign Impersonates US Congressman US lawmakers have accused the Chinese government of being behind a cyber espionage campaign that impersonated a prominent Congressman. The…
Linux Malware Ransomware Vulnerabilities2 Min Read September 9, 2025 Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure Cybersecurity researchers began tracking a sophisticated campaign in the closing months of 2024, targeting both government and corporate…
Artificial Intelligence Malware Phishing4 Min Read September 9, 2025 From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan…
Cloud Security Malware4 Min Read September 9, 2025 TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks…
Malware Phishing Ransomware Windows2 Min Read September 8, 2025 MostereRAT Targets Windows Users With Stealth Tactics A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan…
Malware Ransomware Vulnerabilities2 Min Read September 8, 2025 SAP S/4HANA Users Urged to Patch Critical Exploited Bug Security experts have warned SAP S/4HANA cloud customers that a critical code injection vulnerability patched by the vendor in August is being…
Cyber Espionage Malware4 Min Read September 6, 2025 Noisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity,…
Botnet Malware4 Min Read September 5, 2025 TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan…
Cryptocurrency Malware3 Min Read September 5, 2025 VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing…
Cybersecurity Malware3 Min Read September 4, 2025 Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks…
Data Breach Malware4 Min Read September 4, 2025 GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to…
Artificial Intelligence Malware2 Min Read September 4, 2025 Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X’s malvertising…
Malware2 Min Read September 3, 2025 Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum…