Data Breach Phishing Ransomware2 Min Read September 8, 2025 Wealthsimple Confirms Data Breach After Supply Chain Attack Canadian fintech firm Wealthsimple has confirmed a data breach that exposed sensitive customer information. The incident, detected on August…
Ransomware4 Min Read September 8, 2025 Quantum Computing is Coming: Enterprises Need to Prepare Now Quantum computing is coming. When? No one knows for sure. Some experts say 10 years, others say 15 to 20 years. Many believe quantum computers…
Malware Phishing Ransomware Windows2 Min Read September 8, 2025 MostereRAT Targets Windows Users With Stealth Tactics A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan…
Network Ransomware Vulnerabilities Windows2 Min Read September 8, 2025 Remote Access Abuse Biggest Pre-Ransomware Indicator Abuses of remote access software and services are the most common ‘pre-ransomware’ indicators, according to new research from…
Ransomware4 Min Read September 8, 2025 Finding Agility in Post Quantum Encryption (PQC) In an era where data security is paramount, current encryption algorithms are sufficient to safeguard sensitive information. However, the…
Malware Ransomware Vulnerabilities2 Min Read September 8, 2025 SAP S/4HANA Users Urged to Patch Critical Exploited Bug Security experts have warned SAP S/4HANA cloud customers that a critical code injection vulnerability patched by the vendor in August is being…
Cloud Security DDoS Linux Ransomware Windows2 Min Read September 1, 2025 Another Ryzen 9000 CPU Burnout: What’s Really Going On? Ddos September 1, 2025 Earlier this year, reports emerged of Asrock motherboards paired with processors such as the 9800X3D suffering…
Apple Cloud Security Data Breach Ransomware Vulnerabilities Windows4 Min Read September 1, 2025 WhatsApp warns of 'attack against specific targeted users' Infosec In brief A flaw in Meta’s WhatsApp app “may have been exploited in a sophisticated attack against specific targeted…
Data Breach Malware Phishing Ransomware5 Min Read August 31, 2025 How Businesses Can Protect Themselves Against Data Breaches The Threat Landscape According to the Identity Theft Resource Center, one billion people have been victims of a data breach in just the second…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
DDoS Ransomware Vulnerabilities2 Min Read August 31, 2025 Meta’s New AI NPCs Will Make Horizon Worlds Come to Life Ddos August 31, 2025 Meta is once again infusing its metaverse platform, Horizon Worlds, with generative AI experiences, enabling developers…
Cloud Security Network Ransomware6 Min Read August 30, 2025 Ten Cloud-Agnostic Cybersecurity Tips for Protecting Your Data Across Platforms When it comes to rapidly scaling operational processing power and expanding digital storage, cloud platform solutions are unmatched. Offering…
Data Breach Ransomware5 Min Read August 30, 2025 Banking-as-a-Service BaaS on a Global Scale Banking-as-a-Service (BaaS) solutions bring exciting new revenue streams to the banking world. This partnership model…
DDoS Network Ransomware Vulnerabilities Windows2 Min Read August 30, 2025 BadSuccessor (CVE-2025-53779) Technique Persists Despite Microsoft Patch Ddos August 30, 2025 At DEF CON 2025, Akamai security researcher Yuval Gordon revealed the story of BadSuccessor (CVE-2025-53779), an Active…
Apple DDoS Malware Network Ransomware Vulnerabilities Windows2 Min Read August 30, 2025 MystRodX: A Stealthy New Backdoor Found Hiding in Networks for Over 20 Months Ddos August 30, 2025 XLab has identified a previously unknown and stealthy backdoor dubbed MystRodX, capable of operating undetected in…
DDoS Ransomware Vulnerabilities2 Min Read August 29, 2025 QNAP Patches Critical Flaw (CVE-2025-52856) with CVSS 9.3 Ddos August 29, 2025 QNAP has released a security advisory addressing multiple vulnerabilities affecting the QVR firmware on legacy VioStor…
Apple DDoS Ransomware Vulnerabilities2 Min Read August 29, 2025 A Critical Zero-Click WhatsApp Flaw, CVE-2025-55177, Was Exploited in Zero-Day Attacks Ddos August 29, 2025 Meta’s WhatsApp Security Team has patched a zero-day flaw (CVE-2025-55177) in WhatsApp for iOS (prior to…
Ransomware Vulnerabilities2 Min Read August 29, 2025 Citrix Netscaler 0-day RCE Vulnerability Patched – Vulnerable Instances Reduced from 28.2K to 12.4K A significant global effort to patch a critical zero-day remote code execution (RCE) vulnerability in Citrix NetScaler devices has seen the…
Data Breach Ransomware6 Min Read August 29, 2025 Data Privacy Claims on The Rise as Evolving Regulation, Wave of Litigation, And AI Shape Future Risk Landscape Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents. The…
Malware Network Phishing Ransomware Vulnerabilities Windows4 Min Read August 29, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in…
Malware Phishing Ransomware Windows4 Min Read August 29, 2025 North Korean Hackers Weaponize Seoul Intelligence Files to Target South Koreans A large-scale spear-phishing campaign targeting South Korean government and intelligence staff has exploited a national intelligence…
Phishing Ransomware4 Min Read August 29, 2025 Reduce Fraud Risk with Effective Identity Verification In a world where transactions occur smoothly across borders and platforms, the need for robust fraud and risk management strategies…
Malware Ransomware Vulnerabilities Windows3 Min Read August 29, 2025 State-Sponsored Hackers Behind Majority of Vulnerability Exploits The majority (53%) of attributed vulnerability exploits in the first half 2025 were conducted by state-sponsored actors for strategic,…
Data Breach Ransomware2 Min Read August 29, 2025 TransUnion Data Breach Impacts 4.5 Million US Customers Credit rating giant TransUnion has suffered a data breach, which has impacted the personal information of nearly 4.5 million Americans. The…
Android Apple Cloud Security Identity and Access Management Linux Ransomware Spotlight Vulnerability Management Windows5 Min Read August 28, 2025 Innovator Spotlight: ManageEngine Unifying IT Management and Security with ManageEngine In today’s digital landscape, IT can feel like juggling flaming torches, one…
Malware Ransomware3 Min Read August 28, 2025 Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of…
Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 BadSuccessor Post-Patch: Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Microsoft’s recent patch for the BadSuccessor vulnerability (CVE-2025-53779) has successfully closed the direct privilege escalation…
Ransomware Vulnerabilities2 Min Read August 28, 2025 Urgent CISA Alert on Citrix NetScaler In August 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding multiple critical security…
Ransomware5 Min Read August 28, 2025 With Ransomware Attacks Surging, Eliminate Silos and Tap Genai to Strengthen Threat Intelligence After a brief lull in ransomware attacks following the LockBit disruption earlier this year, ransomware attacks spiked again in the…
Malware Phishing Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Fake IT Support Attacks Hit Microsoft Teams A new wave of phishing attacks abusing Microsoft Teams to deliver malware has been uncovered by security researchers. The campaigns, observed…
Network Ransomware Vulnerabilities3 Min Read August 28, 2025 UK and US Blame Three Chinese Tech Firms for Global Cyberattacks A coalition of international cybersecurity agencies led by the UK’s National Cyber Security Centre (NCSC) has publicly linked three…
DDoS Ransomware Vulnerabilities2 Min Read August 28, 2025 Thousands of Citrix NetScaler boxes still sitting ducks despite patches Thousands of Citrix NetScaler appliances remain exposed to a trio of security flaws that the vendor patched this week, one of which is already…
Ransomware4 Min Read August 28, 2025 You Can’t Protect What You Can’t See A business ecosystem is a borderless entity. Where organizations operate across vast, global networks, achieving a comprehensive view of their…
Malware Ransomware Windows2 Min Read August 28, 2025 Malicious VS Code Extensions Exploit Name Reuse Loophole A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows…
Data Breach Ransomware2 Min Read August 28, 2025 Nevada Confirms Ransomware Attack, State Data Stolen A security incident impacting the state of Nevada has been confirmed to be a ransomware attack. Nevada’s chief information officer (CIO)…
Malware Phishing Ransomware Vulnerabilities Windows3 Min Read August 28, 2025 When Best Practices Aren’t Enough: UK Breaches Underscore the Importance of Compromise Assessments Despite extensive guidance from national authorities, several prominent UK organizations have recently suffered significant cyber attacks.…
DDoS Network Ransomware Vulnerabilities2 Min Read August 28, 2025 Cisco Warns of High-Severity DoS Flaw (CVE-2025-20241) in Nexus Switches Ddos August 28, 2025 Cisco Systems has published a security advisory detailing a high-severity denial-of-service (DoS) vulnerability affecting…
Cloud Security Malware Ransomware Windows4 Min Read August 28, 2025 Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure A threat actor has destroyed data and backups following exfiltration in a victim’s Microsoft Azure environment in a novel cloud-based…
Cloud Security Ransomware3 Min Read August 28, 2025 Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion…
Artificial Intelligence Ransomware3 Min Read August 28, 2025 Someone Created First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock.…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…