Malware Phishing Ransomware Windows2 Min Read September 9, 2025 Chinese Cyber Espionage Campaign Impersonates US Congressman US lawmakers have accused the Chinese government of being behind a cyber espionage campaign that impersonated a prominent Congressman. The…
Linux Malware Ransomware Vulnerabilities2 Min Read September 9, 2025 Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure Cybersecurity researchers began tracking a sophisticated campaign in the closing months of 2024, targeting both government and corporate…
Artificial Intelligence Malware Phishing4 Min Read September 9, 2025 From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan…
Cloud Security Malware4 Min Read September 9, 2025 TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks…
Malware Phishing Ransomware Windows2 Min Read September 8, 2025 MostereRAT Targets Windows Users With Stealth Tactics A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan…
Malware Ransomware Vulnerabilities2 Min Read September 8, 2025 SAP S/4HANA Users Urged to Patch Critical Exploited Bug Security experts have warned SAP S/4HANA cloud customers that a critical code injection vulnerability patched by the vendor in August is being…
Cyber Espionage Malware4 Min Read September 6, 2025 Noisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity,…
Botnet Malware4 Min Read September 5, 2025 TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan…
Cryptocurrency Malware3 Min Read September 5, 2025 VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing…
Cybersecurity Malware3 Min Read September 4, 2025 Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks…
Data Breach Malware4 Min Read September 4, 2025 GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to…
Artificial Intelligence Malware2 Min Read September 4, 2025 Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X’s malvertising…
Malware2 Min Read September 3, 2025 Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum…
Malware Threat Intelligence2 Min Read September 2, 2025 Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE The North Korea-linked threat actor known as the Lazarus Group has been attributed to a social engineering campaign that distributes three…
Cryptocurrency Malware2 Min Read September 2, 2025 Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop apps…
Malware3 Min Read September 1, 2025 ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka…
Apple Malware Vulnerabilities2 Min Read August 31, 2025 WhatsApp 0-Day Exploited in Attacks on Targeted iOS and macOS Users WhatsApp has patched a critical 0-day (CVE-2025-55177) that allowed zero-click spyware attacks on iOS and Mac users. The flaw was used to…
Data Breach Malware Phishing Ransomware5 Min Read August 31, 2025 How Businesses Can Protect Themselves Against Data Breaches The Threat Landscape According to the Identity Theft Resource Center, one billion people have been victims of a data breach in just the second…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
Endpoint Security Malware4 Min Read August 30, 2025 Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring…
Android Apple Malware Phishing Vulnerabilities2 Min Read August 30, 2025 WhatsApp’s Zero-Click Vulnerability and Targeted Spyware Attacks A newly discovered critical vulnerability has put WhatsApp users across the globe on high alert. CVE-2025-55177, patched in August 2025, was a…
Apple DDoS Malware Network Ransomware Vulnerabilities Windows2 Min Read August 30, 2025 MystRodX: A Stealthy New Backdoor Found Hiding in Networks for Over 20 Months Ddos August 30, 2025 XLab has identified a previously unknown and stealthy backdoor dubbed MystRodX, capable of operating undetected in…
Apple Malware Vulnerabilities2 Min Read August 29, 2025 WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific…
Malware Network Phishing Ransomware Vulnerabilities Windows4 Min Read August 29, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in…
Malware Phishing Ransomware Windows4 Min Read August 29, 2025 North Korean Hackers Weaponize Seoul Intelligence Files to Target South Koreans A large-scale spear-phishing campaign targeting South Korean government and intelligence staff has exploited a national intelligence…
Malware Threat Intelligence2 Min Read August 29, 2025 Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked…
Cyber Espionage Malware4 Min Read August 29, 2025 Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an…
Malware3 Min Read August 29, 2025 Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal…
Malware Ransomware Vulnerabilities Windows3 Min Read August 29, 2025 State-Sponsored Hackers Behind Majority of Vulnerability Exploits The majority (53%) of attributed vulnerability exploits in the first half 2025 were conducted by state-sponsored actors for strategic,…
Malware3 Min Read August 29, 2025 TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites…
Malware Ransomware3 Min Read August 28, 2025 Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of…
Malware Phishing Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Fake IT Support Attacks Hit Microsoft Teams A new wave of phishing attacks abusing Microsoft Teams to deliver malware has been uncovered by security researchers. The campaigns, observed…
Malware Phishing Vulnerabilities Windows3 Min Read August 28, 2025 ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader…
Malware Ransomware Windows2 Min Read August 28, 2025 Malicious VS Code Extensions Exploit Name Reuse Loophole A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows…
Malware Phishing Ransomware Vulnerabilities Windows3 Min Read August 28, 2025 When Best Practices Aren’t Enough: UK Breaches Underscore the Importance of Compromise Assessments Despite extensive guidance from national authorities, several prominent UK organizations have recently suffered significant cyber attacks.…
Apple Linux Malware Network Vulnerabilities3 Min Read August 28, 2025 CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors The U.S. Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI, and a broad coalition of international partners, has…
Artificial Intelligence Malware3 Min Read August 28, 2025 U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions against two…
Cloud Security Malware Ransomware Windows4 Min Read August 28, 2025 Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure A threat actor has destroyed data and backups following exfiltration in a victim’s Microsoft Azure environment in a novel cloud-based…
Malware3 Min Read August 28, 2025 ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia…
Malware Threat Intelligence3 Min Read August 28, 2025 Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…