C2 command-and-control DDoS Malware Phishing Ransomware rce Stealer TROJAN Windows2 Min Read October 7, 2025 XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
Data Breach DDoS Phishing Ransomware3 Min Read October 6, 2025 Ransomware Group “Trinity of Chaos” Launches Data Leak Site A new data leak site hosted on the TOR network has been launched by the “Trinity of Chaos” – a ransomware collective…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Breach conti Phishing Ransomware Supply Chain2 Min Read October 6, 2025 Renault Informs Customers of Supply Chain Data Breach Carmaker Renault has been forced to notify an unspecified number of customers that their personal data may have been compromised by threat…
Breach leaked Mobile Phishing4 Min Read October 5, 2025 ParkMobile pays… $1 each for 2021 data breach that hit 22 million ParkMobile has finally wrapped up a class action lawsuit over the platform’s 2021 data breach that hit 22 million users. But…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Cloud Security Phishing Vulnerabilities4 Min Read October 3, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 40 The Good | UK Convicts “Bitcoin Queen” in World’s Largest Cryptocurrency Seizure This week, a court in the UK convicted…
DDoS Exploits Phishing Vulnerabilities2 Min Read October 3, 2025 Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform.…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 3, 2025 Google Announces $4 Billion Arkansas Investment for New AI Data Center and 600 MW Solar Project Google has announced plans to invest up to $4 billion in Arkansas by 2027, channeling resources into infrastructure, energy transition, and…
Cloud Security Phishing Vulnerabilities Web Security2 Min Read October 3, 2025 Yoast SEO Premium Flaw: Stored XSS Bug (CVE-2025-11241) Exposes Millions of WordPress Sites A new has been disclosed in the widely used Yoast SEO Premium plugin for WordPress, potentially exposing millions of websites to cross-site…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Exploits Phishing Ransomware Social Engineering4 Min Read October 2, 2025 US Government Shutdown to Slash Federal Cybersecurity Staff The US government shutdown will severely deplete federal cybersecurity capabilities, with the Cybersecurity and Infrastructure Security Agency…
Malware Phishing Ransomware Windows2 Min Read October 2, 2025 Confucius Shifts from Document Stealers to Python Backdoors A long-running cyber-espionage group known as Confucius has introduced new techniques in its campaigns against Microsoft Windows users. First…
Blackpoint Cyber Cyber Attack Cybersecurity Fraud Malware Phishing Phishing Scam PowerShell Scam Security Windows3 Min Read October 2, 2025 Malicious ZIP Files Use Windows Shortcuts to Drop Malware A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’ trust…
DDoS Malware Phishing Ransomware2 Min Read October 2, 2025 Phishing Dominates EU-Wide Intrusions, says ENISA Phishing and vulnerability exploitation accounted for the vast majority of initial access in cyber-attacks against EU organizations over the…
DDoS Phishing Vulnerabilities Web Security3 Min Read October 2, 2025 Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers to…
Malware Phishing Vulnerabilities Windows2 Min Read October 2, 2025 Critical Flaw in Termix Docker Image (CVE-2025-59951) Leaks SSH Credentials Without Authentication The Termix project has disclosed a critical authentication bypass in its official Docker image, exposing sensitive SSH configuration data…
DDoS Phishing Ransomware Vulnerabilities3 Min Read October 2, 2025 Splunk Fixes Six Flaws, Including Unauthenticated SSRF and XSS Vulnerabilities in Enterprise Platform Splunk has released a series of advisories addressing six in Splunk Enterprise and Splunk Cloud Platform, ranging from medium to high…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 That annoying SMS phish you just got may have come from a box like this The researchers added: “This campaign is notable in that it demonstrates how impactful smishing operations can be executed using simple,…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
AI Cyber Attack Cyber Crime Cybersecurity FraudGPT MatrixPDF Phishing Security SpamGPT WormGPT2 Min Read October 1, 2025 Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks A new trend lately observed in the world of cybercrime is the demand for user-friendly, plug-and-play tools that make it easier for people…
Data Breach Exploits Phishing Ransomware3 Min Read October 1, 2025 Navigating Holiday Threats: Strengthening PC Resilience with Desktops as a Service (DaaS) The holiday season, often seen as a time for joy and celebration, has transformed into a crucial period for organizational cybersecurity. With…
Phishing2 Min Read October 1, 2025 Campaign Warns Solicitors and House Buyers of Payment Diversion Fraud UK house buyers hit with payment diversion fraud (PDF) have suffered average losses of £82,000 over the past year, a new awareness campaign…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…
Exploits Network Phishing Ransomware2 Min Read September 30, 2025 Smishing Campaigns Exploit Cellular Routers to Target Belgium A newly identified wave of smishing attacks has been traced to exploited Milesight Industrial Cellular Routers. According to research by…
Phishing Ransomware Vulnerabilities Windows2 Min Read September 30, 2025 Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web Veeam Backup & Replication, a cornerstone of many enterprises’ data protection strategy, has reportedly become the focus of a new…
Phishing Ransomware4 Min Read September 30, 2025 US Cuts Federal Funding for MS-ISAC Cybersecurity Program The US federal government is cutting support for a major federal cyber threat information-sharing program. In a public statement published on…
Cloud Security Phishing3 Min Read September 30, 2025 Gemini Trifecta Highlights Dangers of Indirect Prompt Injection Network defenders must start treating AI integrations as active threat surfaces, experts have warned after revealing three new vulnerabilities…
AI Artificial Intelligence Fraud LLM Microsoft Phishing Phishing Scam Scam Security SVG3 Min Read September 30, 2025 Microsoft Flags AI Phishing Attack Hiding in SVG Files Forget the old, error-filled emails you could spot easily. Cybercriminals have completely upgraded their methods, using AI (Artificial…
Malware Phishing Vulnerabilities Windows3 Min Read September 29, 2025 China-linked RedNovember Campaign Shows Importance of Patching Edge Devices A long-running threat campaign linked to a Chinese state-sponsored cyber-espionage group highlights the importance of patching and protecting…
Exploits Phishing Windows2 Min Read September 29, 2025 AI-Generated Code Used in Phishing Campaign Blocked by Microsoft A credential phishing campaign that likely relied on AI-generated code to evade detection has been stopped by Microsoft Threat Intelligence.…
Malware Phishing Ransomware Windows2 Min Read September 29, 2025 Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach Cybersecurity isn’t a game of defense—it’s a game of anticipation. Yet too many CISOs and security leaders still think in…
Exploits Phishing Ransomware Vulnerabilities4 Min Read September 29, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Malware Phishing Ransomware Vulnerabilities3 Min Read September 29, 2025 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code…
Data Breach DDoS Phishing Vulnerabilities2 Min Read September 29, 2025 SUSE Rancher Security Team Patches Three Vulnerabilities in Rancher Manager The SUSE Rancher Team has issued fixes for three affecting Rancher Manager, with severities ranging from Medium to High. These could lead to…
Data Breach Phishing Ransomware Vulnerabilities12 Min Read September 28, 2025 Cybersecurity Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the…
Malware Phishing Ransomware3 Min Read September 28, 2025 AsyncRAT Malware Campaign Found Targeting South American Hotels A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of…
Malware Phishing Vulnerabilities Windows5 Min Read September 28, 2025 Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How Juventus protects fans,…
Amatera Stealer Crypto Cryptojacking Cybersecurity Malware Phishing Phishing Scam Police PureMiner Security SVG Ukraine2 Min Read September 26, 2025 Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner Hackers are distributing malicious emails that imitate official notices from the National Police of Ukraine. This phishing campaign,…
Exploits Phishing Ransomware3 Min Read September 26, 2025 Interpol Cracks Down on Large-Scale African Scamming Networks A transnational operation involving 14 African countries has taken down a large-scale digital scamming network, leading to 260 arrests and the…
Botnets Malware Phishing Windows2 Min Read September 25, 2025 Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment…