Cloud Security Phishing Ransomware2 Min Read September 9, 2025 Salty2FA Phishing Kit Unveils New Level of Sophistication A phishing campaign leveraging the Salty2FA kit has been uncovered by cybersecurity researchers, revealing advanced techniques that highlight…
Phishing Windows2 Min Read September 9, 2025 Axios User Agent Helps Automate Phishing on “Unprecedented Scale” Security experts have warned of a huge uptick in automated phishing activity abusing the Axios user agent and Microsoft’s Direct Send…
Malware Phishing Ransomware Windows2 Min Read September 9, 2025 Chinese Cyber Espionage Campaign Impersonates US Congressman US lawmakers have accused the Chinese government of being behind a cyber espionage campaign that impersonated a prominent Congressman. The…
Artificial Intelligence Malware Phishing4 Min Read September 9, 2025 From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan…
AI threat detection CISO strategies CrowdStrike Falcon Fund Data Breach Network Phishing Phishing Protection Ransomware Ransomware Defense SaaS Security Seraphic Security Spotlight Vulnerabilities Zero Trust6 Min Read September 8, 2025 Innovator Spotlight: Seraphic Reinventing Browser Security for the Enterprise The Browser: Enterprise’s Biggest Blind Spot On any given day, the humble web browser is…
Data Breach Phishing Ransomware2 Min Read September 8, 2025 Wealthsimple Confirms Data Breach After Supply Chain Attack Canadian fintech firm Wealthsimple has confirmed a data breach that exposed sensitive customer information. The incident, detected on August…
Malware Phishing Ransomware Windows2 Min Read September 8, 2025 MostereRAT Targets Windows Users With Stealth Tactics A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan…
Data Breach Malware Phishing Ransomware5 Min Read August 31, 2025 How Businesses Can Protect Themselves Against Data Breaches The Threat Landscape According to the Identity Theft Resource Center, one billion people have been victims of a data breach in just the second…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
Android Apple Malware Phishing Vulnerabilities2 Min Read August 30, 2025 WhatsApp’s Zero-Click Vulnerability and Targeted Spyware Attacks A newly discovered critical vulnerability has put WhatsApp users across the globe on high alert. CVE-2025-55177, patched in August 2025, was a…
Malware Network Phishing Ransomware Vulnerabilities Windows4 Min Read August 29, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in…
Malware Phishing Ransomware Windows4 Min Read August 29, 2025 North Korean Hackers Weaponize Seoul Intelligence Files to Target South Koreans A large-scale spear-phishing campaign targeting South Korean government and intelligence staff has exploited a national intelligence…
Phishing Ransomware4 Min Read August 29, 2025 Reduce Fraud Risk with Effective Identity Verification In a world where transactions occur smoothly across borders and platforms, the need for robust fraud and risk management strategies…
Malware Phishing Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Fake IT Support Attacks Hit Microsoft Teams A new wave of phishing attacks abusing Microsoft Teams to deliver malware has been uncovered by security researchers. The campaigns, observed…
Network Phishing Vulnerabilities3 Min Read August 28, 2025 Cisco IMC Virtual Keyboard Video Monitor Let Attacker Direct User to Malicious Website Cisco disclosed a high-severity open redirect vulnerability in the Virtual Keyboard Video Monitor (vKVM) component of its Integrated…
Malware Phishing Vulnerabilities Windows3 Min Read August 28, 2025 ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader…
Malware Phishing Ransomware Vulnerabilities Windows3 Min Read August 28, 2025 When Best Practices Aren’t Enough: UK Breaches Underscore the Importance of Compromise Assessments Despite extensive guidance from national authorities, several prominent UK organizations have recently suffered significant cyber attacks.…
Apple Network Phishing Vulnerabilities3 Min Read August 28, 2025 Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns The UK, US and partners from across the globe have released a new report on the notorious Chinese APT group Salt Typhoon, claiming it has…
Data Breach Malware Phishing Ransomware2 Min Read August 28, 2025 ShadowSilk Campaign Targets Central Asian Governments A series of cyber-attacks against government organizations in Central Asia and the Asia-Pacific has been linked to a threat cluster known as…
Phishing3 Min Read August 28, 2025 New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices A novel phishing campaign attempts to trick victims into downloading ConnectWise ScreenConnect remote monitoring and management (RMM)…
Android Data Breach Malware Phishing Ransomware Windows4 Min Read August 27, 2025 HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
Android Malware Phishing Ransomware2 Min Read August 27, 2025 New Android Trojan Variant Expands with Ransomware Tactics A new version of the Hook Android banking Trojan has surfaced, showcasing one of the most extensive feature sets ever recorded for mobile…
Malware Network Phishing2 Min Read August 27, 2025 Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools A global phishing campaign using personalized emails and fake websites to deliver malicious downloads has been identified by cybersecurity…
DDoS Identity Security Phishing Ransomware ThreatLocker Windows8 Min Read August 27, 2025 Black Hat Ignites Under Vegas Lights Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me forward. “The End”…
Malware Phishing4 Min Read August 27, 2025 Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving rapidly,…
Cloud Security Data Breach Malware Phishing Ransomware Vulnerabilities5 Min Read August 27, 2025 Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However,…
Malware Network Phishing Ransomware Vulnerabilities Windows2 Min Read August 26, 2025 Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging…
Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Android Apple Cloud Security DDoS Network Phishing Privacy & Compliance Vulnerabilities4 Min Read August 25, 2025 Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by…
Cloud Security Network Phishing Ransomware4 Min Read July 30, 2025 Backdoors & Breaches gameplay guide At DASH 2025, we released a Datadog expansion pack of Backdoors & Breaches, a popular incident response card game by Black Hills…
Cloud Security Phishing Supply Chain3 Min Read July 28, 2025 Datadog guide to Hacker Summer Camp 2025 Every year in early August, conferences in Las Vegas, Nevada, serve as a gathering of security professionals in a single place. This time of…
Cloud Security Malware Phishing Ransomware11 Min Read April 17, 2025 Datadog threat roundup: Top insights for Q1 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…