Data Breach Malware Ransomware Windows3 Min Read September 26, 2025 New LockBit Ransomware Variant Emerges as Most Dangerous Yet Trend Micro has identified a new LockBit ransomware variant that is “significantly more dangerous” than previous versions and is being…
Botnets Malware Phishing Windows2 Min Read September 25, 2025 Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment…
Phishing Ransomware Windows4 Min Read September 25, 2025 The Threat of Privilege Abuse in Active Directory In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare sector. It later…
Malware Ransomware Vulnerabilities Windows3 Min Read September 25, 2025 Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms Chinese cyber threat actors are suspected of deploying a recently identified backdoor to get a foothold into the systems of US organizations…
Linux Social Engineering Vulnerabilities Windows2 Min Read September 25, 2025 CVE-2025-41715 (CVSS 9.8): Unauthenticated Flaw Exposes WAGO Industrial Databases VDE CERT has issued a security advisory disclosing two vulnerabilities in WAGO Device Sphere and WAGO Solution Builder, software widely used…
Linux Malware Vulnerabilities Windows5 Min Read September 24, 2025 Google warns China-linked spies lurking in 'numerous' enterprises since March Unknown intruders – likely China-linked spies – have broken into "numerous" enterprise networks since March and deployed…
DDoS Linux Vulnerabilities Windows3 Min Read September 24, 2025 Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System Google has issued an urgent security update for its Chrome web browser to address three high-severity vulnerabilities that could allow…
Vulnerabilities Web Security Windows2 Min Read September 24, 2025 CVE-2025-59545: Critical XSS Flaw in DNN Software Puts 750,000 Websites at Risk DNN Software has issued a security advisory warning of a critical stored cross-site scripting (XSS) vulnerability in its Prompt module,…
Exploits Linux Vulnerabilities Windows2 Min Read September 24, 2025 Google Chrome Patches Three High-Severity Flaws in V8 Engine Google has released a Stable Channel Update for Desktop with builds 140.0.7339.207/.208 for Windows and Mac and 140.0.7339.207 for Linux. The…
Malware Ransomware Vulnerabilities Windows3 Min Read September 23, 2025 22 Vulnerabilities Under Attack – And Another That Could Be Cyble researchers detailed 22 vulnerabilities under active attack in a blog post today – and nine of them aren’t in CISA’s…
Cloud Security Malware Phishing Windows2 Min Read September 23, 2025 Iranian Hacking Group Nimbus Manticore Expands European Targeting A long-running cyber-espionage campaign tied to Iran has intensified its operations in Europe. The group, known as Nimbus Manticore, has a…
Phishing Ransomware Social Engineering Windows3 Min Read September 23, 2025 Deepfake Attacks Hit Two-Thirds of Businesses Nearly two-thirds (62%) of organizations have experienced a deepfake attack in the past 12 months, according to a new Gartner survey. These…
Linux Ransomware Vulnerabilities Windows2 Min Read September 23, 2025 CVE-2025-26399 (CVSS 9.8): SolarWinds Web Help Desk Hit by Critical RCE Vulnerability SolarWinds has released a hotfix for its Web Help Desk (WHD) software after the discovery of a critical remote code execution (RCE)…
Vulnerabilities Web Security Windows2 Min Read September 23, 2025 CVE-2025-9125: Cross-Site Scripting Flaw in Lectora Courses Puts E-Learning Platforms at Risk The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of a cross-site scripting (XSS) flaw affecting Lectora, a…
Botnets Malware Supply Chain Windows2 Min Read September 23, 2025 BlockBlasters: When a Steam Game Turns Into a Malware Delivery Vehicle What began as a promising indie platformer has turned into one of the most alarming cases of malware-laced games on Steam in 2025. According…
Data Breach Malware Ransomware Windows3 Min Read September 23, 2025 Kawa4096: A New Ransomware Group with Akira-Style Branding and Qilin-Like Notes In June 2025, a new ransomware group known as Kawa4096 surfaced, launching disruptive attacks against multinational organizations in finance,…
Malware Phishing Vulnerabilities Windows2 Min Read September 23, 2025 Beyond Trust: A New Campaign Is Using a Legitimate Tool to Deliver RATs A new report from Hunt Intelligence reveals how attackers are abusing ConnectWise ScreenConnect (formerly ConnectWise Control) to deliver…
Malware Network Ransomware Windows6 Min Read September 22, 2025 Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE’s annual endpoint detection and…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Cloud Security Exploits Vulnerabilities Windows3 Min Read September 22, 2025 Microsoft Entra ID Exposed: Actor Token Flaw Enables Stealthy Global Admin Takeove A newly disclosed vulnerability tracked as CVE-2025-55241 has been reported. The flaw, discovered by an independent researcher and disclosed…
Malware Ransomware Vulnerabilities Windows14 Min Read September 20, 2025 WannaCry Ransomware: A DFIR & SOC Monitoring Lab Walkthrough Hello fellow defenders, I hope you are having a great day. In this article, I’m going to show you how you can make a cybersecurity home…
Malware Phishing Vulnerabilities Windows2 Min Read September 19, 2025 CVE-2025-59340: Critical HubSpot’s Jinjava Engine Flaw Exposes Thousands of Websites to RCE HubSpot has issued a security advisory regarding a critical flaw in its Jinjava template engine, which powers thousands of websites and…
Data Breach Ransomware Vulnerabilities Windows2 Min Read September 18, 2025 GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware The cyberthreat landscape has witnessed the emergence of another sophisticated ransomware operation as GOLD SALEM, a new threat actor group…
Linux Malware Vulnerabilities Windows2 Min Read September 18, 2025 Google pushes emergency patch for Chrome 0-day – check your browser version now Google pushed an emergency patch for a high-severity Chrome flaw, already under active exploitation. So it's time to make sure you're running…
Cloud Security Vulnerabilities Windows3 Min Read September 18, 2025 Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control A critical vulnerability in Microsoft’s Entra ID could have allowed an attacker to gain complete administrative control over any tenant…
Exploits Linux Vulnerabilities Windows1 Min Read September 18, 2025 Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its…
Apple Linux Vulnerabilities Windows3 Min Read September 18, 2025 Google Confirms Real-World Attacks on Chrome Vulnerability CVE-2025-10585 Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
Data Breach Exploits Vulnerabilities Windows3 Min Read September 18, 2025 Phoenix (CVE-2025-6202): A New Rowhammer Attack Bypasses DDR5 Protections Researchers from ETH Zurich have unveiled Phoenix, a new Rowhammer attack that successfully bypasses in-DRAM mitigations in all tested SK…
Exploits IoT Security Web Security Windows6 Min Read September 17, 2025 How LLMs can be compromised in 2025 | Kaspersky official blog Developers of LLM-powered public services and business applications are working hard to ensure the security of their products, but the…
Exploits Malware Phishing Windows2 Min Read September 17, 2025 FileFix Campaign Using Steganography and Multistage Payloads A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted…
Malware Phishing Ransomware Windows2 Min Read September 17, 2025 Microsoft Disrupts RaccoonO365 Phishing Kit, Seizes 338 Malicious Sites Microsoft has announced the disruption of RaccoonO365, a popular subscription-based phishing kit focused on the theft of Microsoft365…
CA SiteMinder Conditional Access CyberArk Featured ForgeRock Identity and Access Management (IAM) Microsoft Entra ID Multi-Factor Authentication (MFA) Okta PingFederate Privileged Access Management (PAM) QRadar SIEM Ransomware SailPoint Secrets Management Single Sign-On (SSO) Venafi Windows4 Min Read September 16, 2025 Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point that…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Linux Phishing Web Security Windows2 Min Read September 16, 2025 Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads A new AI-native penetration testing tool called Villager has reached nearly 11,000 downloads on the Python Package Index (PyPI) just two…
Network Ransomware Vulnerabilities Windows3 Min Read September 16, 2025 Ransomware attackers used incorrectly stored recovery codes to disable EDR agents All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any…
Apple Linux Vulnerabilities Windows2 Min Read September 16, 2025 Chrome’s New Preloading is a Game-Changer Google has long experimented with prerendering technology in Chrome to accelerate page loading by rendering content in advance so that pages…
Linux Ransomware Vulnerabilities Windows8 Min Read September 16, 2025 Nessus vs Metasploit Comparison: How To Exploit Vulnerabilities Using These Powerful Tools The cybersecurity landscape demands sophisticated tools to identify and exploit vulnerabilities effectively, with Nessus vs Metasploit…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Malware Phishing Ransomware Windows2 Min Read September 15, 2025 SEO Poisoning Targets Chinese Users with Fake Software Sites A search engine optimization (SEO) poisoning attack aimed at Chinese-speaking Microsoft Windows users has been identified by security…
Cloud Security Malware Ransomware Windows2 Min Read September 15, 2025 OpenAI’s New Grove Incubator Is Building the Next Generation of AI Startups OpenAI recently unveiled its internal incubation initiative, OpenAI Grove. Unlike traditional startup accelerators or incubator programs,…
Cloud Security Phishing Ransomware Windows2 Min Read September 15, 2025 Phishing Campaigns Drop RMM Tools for Remote Access Malicious actors are using multiple lures in new phishing campaigns designed to install remote monitoring and management (RMM) software onto…