Identity theft Threat Intelligence3 Min Read December 2, 2025 Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a…
Security Automation Threat Intelligence4 Min Read November 25, 2025 3 SOC Challenges You Need to Solve Before 2026 2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using…
Malware Threat Intelligence5 Min Read November 21, 2025 APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…
Cyber Warfare Threat Intelligence3 Min Read November 20, 2025 Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend…
Threat Intelligence Vulnerability2 Min Read November 19, 2025 NHS Warns of PoC Exploit for 7-Zip Symbolic Link–Based RCE Vulnerability Update: The NHS England Digital, in an updated advisory on November 20, 2025, said it has not observed in-the-wild exploitation of…
Threat Intelligence Vulnerability2 Min Read November 19, 2025 WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in…
Malware Threat Intelligence2 Min Read November 14, 2025 North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
Ransomware Threat Intelligence4 Min Read November 14, 2025 Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.…
Threat Intelligence Vulnerability4 Min Read November 14, 2025 Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb Web Application Firewall…
Browser Security Threat Intelligence2 Min Read November 13, 2025 Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to…
Patch Management Threat Intelligence6 Min Read November 13, 2025 When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit…
Compliance Threat Intelligence5 Min Read November 6, 2025 From Tabletop to Turnkey: Building Cyber Resilience in Financial Services Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational…
Data Security Threat Intelligence4 Min Read November 5, 2025 Why SOC Burnout Can Be Avoided: Practical Steps Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing…
Malware Threat Intelligence3 Min Read October 31, 2025 China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut…
Threat Intelligence Vulnerability3 Min Read October 31, 2025 CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from…
Malware Threat Intelligence2 Min Read October 29, 2025 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux Cybersecurity researchers have discovered a set of 10 malicious npm packages that are designed to deliver an information stealer targeting…
SOC Operations Threat Intelligence4 Min Read October 28, 2025 Why Early Threat Detection Is a Must for Long-Term Business Growth In cybersecurity, speed isn't just a win — it's a multiplier. The faster you learn about emerging threats, the faster you adapt your…
Ransomware Threat Intelligence3 Min Read October 27, 2025 Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start…
Cyber Espionage Threat Intelligence2 Min Read October 23, 2025 North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense…
Threat Intelligence Vulnerability1 Min Read October 23, 2025 Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint…
Cyber Espionage Threat Intelligence3 Min Read October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025,…
Data Security Threat Intelligence2 Min Read October 20, 2025 Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities…
Cybercrime Threat Intelligence2 Min Read October 18, 2025 New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Cyber Espionage Threat Intelligence3 Min Read October 15, 2025 Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the…
Threat Intelligence Vulnerability2 Min Read October 15, 2025 F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
SaaS Security Threat Intelligence1 Min Read October 10, 2025 Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Malware Threat Intelligence2 Min Read October 8, 2025 Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it…
Artificial Intelligence Threat Intelligence5 Min Read October 8, 2025 OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…
Malware Threat Intelligence2 Min Read October 7, 2025 BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job…
Threat Intelligence Vulnerability2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Ransomware Threat Intelligence2 Min Read October 2, 2025 Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to…
Threat Intelligence Vulnerability2 Min Read September 26, 2025 Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure Cybersecurity company watchTowr Labs has disclosed that it has "credible evidence" of active exploitation of the recently disclosed security…
Malvertising Threat Intelligence3 Min Read September 25, 2025 Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology (adtech), while relying on a tangled web of shell…
Cyber Espionage Threat Intelligence4 Min Read September 24, 2025 UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the…
National Security Threat Intelligence2 Min Read September 23, 2025 U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN The U.S. Secret Service on Tuesday said it took down a network of electronic devices located across the New York tri-state area that were used…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Cyber Espionage Threat Intelligence5 Min Read September 19, 2025 UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies,…