Cloud Security Data Breach Malware Phishing4 Min Read May 5, 2026 Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures…
Malware Network Phishing Ransomware2 Min Read April 27, 2026 BlackFile Group Targets Retail and Hospitality with Vishing Attacks Security researchers have revealed details of a new extortion group that has been actively targeting retail and hospitality businesses since…
Malware Phishing Ransomware Vulnerabilities3 Min Read April 26, 2026 CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog with four new…
Phishing Ransomware Vulnerabilities Windows2 Min Read April 24, 2026 Microsoft beefs up Remote Desktop security with … hard-to-read messages Microsoft's update to harden Remote Desktop against phishing attacks has arrived. When users open a Remote Desktop (.rdp) file, they should…
Data Breach Malware Phishing Ransomware2 Min Read April 23, 2026 Cyber-Attacks Surge 63% Annually in Education Sector Schools and universities across the globe experienced a sharp increase in attacks last year thanks to the combined threat from…
Exploits Malware Phishing Ransomware2 Min Read April 22, 2026 Surge in Silent Subject Phishing Attacks Targets VIP Users A surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high-value users. According to…
Malware Network Phishing Ransomware5 Min Read March 31, 2026 The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities…
Data Breach Malware Phishing Windows8 Min Read March 10, 2026 Uncovering agent logging gaps in Copilot Studio Key points From at least August 29, 2025 to September 25, 2025, Microsoft Copilot Studio did not log certain administrative actions related to…
Cloud Security Phishing Ransomware Vulnerabilities5 Min Read March 9, 2026 Behind the console: Active phishing campaign targeting AWS console credentials Key points and observations Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS…
February 27, 2026 Hook, line, and vault: A technical deep dive into the 1Phish kit Key points and observations The 1Phish kit evolved between September 2025 and February 2026 from a basic credential harvester into an…
Data Breach Phishing Ransomware Vulnerabilities13 Min Read February 16, 2026 Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons,…
Data Breach Phishing Ransomware Windows14 Min Read January 7, 2026 Decoding the GitHub recommendations for npm maintainers The open source package distribution ecosystem in general has seen an increase in both velocity and severity of targeted attacks (both…
Malware Phishing3 Min Read December 30, 2025 Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a…
December 10, 2025 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users Datadog has identified an active phishing campaign that targets organizations that use Microsoft 365 and Okta for their single sign-on (SSO)…
Data Breach Phishing Ransomware Vulnerabilities2 Min Read October 20, 2025 Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More It's easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show…
Botnets Phishing Ransomware Windows2 Min Read October 15, 2025 Whisper 2FA Behind One Million Phishing Attempts Since July The phishing platform “Whisper 2FA” has rapidly become one of the most active tools used in large-scale credential theft…
Phishing Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Microsoft has confirmed active exploitation of a critical zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan)…
Phishing Ransomware Vulnerabilities Windows1 Min Read October 15, 2025 Chrome Fix: New Use-After-Free Flaw (CVE-2025-11756) in Safe Browsing Component Poses High Risk Google has released a new Stable Channel Update for Desktop, rolling out gradually to Windows, macOS, and Linux systems over the coming days…
Network Phishing Ransomware Social Engineering4 Min Read October 14, 2025 Sweatpants & Cyberthreats: Managing Remote Employee Risk The remote work revolution did not just change where we work, it redefined how we secure our workplaces. The shift, which was accelerated by…
Malware Phishing Ransomware Social Engineering2 Min Read October 14, 2025 Hacker Group TA585 Emerges With Advanced Attack Infrastructure A newly identified cybercriminal group, TA585, has been uncovered by cybersecurity researchers for running one of the most autonomous and…
Android Phishing Vulnerabilities Windows2 Min Read October 14, 2025 New Pixnapping Attack Steals 2FA Codes From Google Authenticator Within 30 Seconds Pixnapping, a novel class of side-channel attacks targeting Android devices that can covertly extract sensitive screen data, including…
Exploits Phishing Vulnerabilities Windows2 Min Read October 14, 2025 Microsoft Patches Edge IE Mode After Hackers Exploited Chakra Zero-Day for Device Takeover After discovering that hackers were exploiting a zero-day in the Chakra JavaScript engine used by Internet Explorer versions 9, 10, and 11,…
Apple Malware Phishing Vulnerabilities2 Min Read October 14, 2025 Critical Elastic Cloud Flaw: CVE-2025-37729 (CVSS 9.1) Allows RCE via Jinjava Template Injection Elastic has released urgent updates for Elastic Cloud Enterprise (ECE) to patch a critical (CVE-2025-37729) that could allow attackers with…
Apple Linux Phishing Windows2 Min Read October 13, 2025 Hackers Target ScreenConnect Features For Network Intrusions A rise in cyber-attacks exploiting remote monitoring and management (RMM) tools for initial access via phishing has been observed by…
Artificial Intelligence Cybercrime Data Breach Featured Phishing Popular Ransomware Vulnerabilities4 Min Read October 13, 2025 AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant? How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager –…
Phishing Vulnerabilities4 Min Read October 13, 2025 Your Alerts Are Increasing Your Cybersecurity Risk At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a…
Android Malware Phishing Ransomware2 Min Read October 13, 2025 Spain Arrests Alleged Leader of GXC Team Cybercrime Network Spanish authorities have arrested a 25-year-old Brazilian national accused of leading the “GXC Team” – a…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Data Breach Phishing Ransomware Vulnerabilities4 Min Read October 11, 2025 Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM) In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses…
DDoS Malware Phishing Vulnerabilities2 Min Read October 11, 2025 Two 7-Zip Flaws Allow Code Execution via Malicious ZIP Files (CVE-2025-11001 & CVE-2025-11002) The Zero Day Initiative (ZDI) has published details of two critical in the popular open-source compression utility 7-Zip, which could allow…
Malware Phishing Ransomware Vulnerabilities5 Min Read October 10, 2025 How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better…
Phishing2 Min Read October 10, 2025 Google Launches AI Bug Bounty with $30,000 Top Reward Google has launched a new AI Vulnerability Reward Program (VRP), which is offering base rewards of up to $30,000 for bugs identified in the…
Malware Phishing Ransomware Windows4 Min Read October 10, 2025 ‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
Malware Phishing2 Min Read October 9, 2025 Researchers Warn of Security Gaps in AI Browsers A new report by security researchers at SquareX Labs has identified several architectural security weaknesses in AI browsers, including…
Android Malware Mobile Security Phishing2 Min Read October 9, 2025 ClayRat Spyware Campaign Targets Android Users in Russia A rapidly evolving Android spyware campaign known as “ClayRat” has been discovered targeting Russian users through Telegram…
Cloud Security DDoS Phishing Ransomware3 Min Read October 8, 2025 Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000 Google has unveiled a new AI Vulnerability Reward Program (VRP), offering payouts of up to $30,000 for researchers who successfully identify…
Phishing Ransomware2 Min Read October 8, 2025 Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue A sharp rise in digital fraud is costing companies worldwide an average of 7.7% of annual revenue, according to TransUnion’s H2 2025…
Cloud Security Phishing Ransomware Vulnerabilities2 Min Read October 8, 2025 Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS Amazon Web Services (AWS) has released an important bulletin warning users of a critical local privilege escalation in the AWS Client VPN…
Cloud Security Malware Phishing Vulnerabilities2 Min Read October 8, 2025 Zimbra XSS Zero-Day (CVE-2025-27915) Actively Exploited; CISA Adds to KEV Catalog A cross-site scripting (XSS) in Synacor Zimbra Collaboration Suite (ZCS) — tracked as CVE-2025-27915 — has been confirmed to be…
Data Breach Phishing Ransomware Vulnerabilities6 Min Read October 7, 2025 ShinyHunters Wage Broad Corporate Extortion Spree A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…
Malware Phishing Ransomware2 Min Read October 7, 2025 Qilin Claims Ransomware Attack on Mecklenburg Schools A ransomware attack that disrupted operations at Mecklenburg County Public Schools (MCPS) in early September has been claimed by the Russian…
Data Breach Malware Phishing Ransomware9 Min Read October 7, 2025 Security in AI Era: Protecting AI Workloads with Google Cloud Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, along with…