Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Cloud Security Network Security2 Min Read October 9, 2025 Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the…
Malware Phishing2 Min Read October 9, 2025 Researchers Warn of Security Gaps in AI Browsers A new report by security researchers at SquareX Labs has identified several architectural security weaknesses in AI browsers, including…
IoT Security Ransomware4 Min Read October 9, 2025 Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025 There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven tech…
Microsoft2 Min Read October 9, 2025 Azure outage blocks access to Microsoft 365 services, admin portals Microsoft is working to resolve an outage affecting its Azure Front Door content delivery network (CDN), which is preventing customers from…
Android Malware Mobile Security Phishing2 Min Read October 9, 2025 ClayRat Spyware Campaign Targets Android Users in Russia A rapidly evolving Android spyware campaign known as “ClayRat” has been discovered targeting Russian users through Telegram…
Cybersecurity Hacking News1 Min Read October 9, 2025 ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to…
Identity Management SaaS Security5 Min Read October 9, 2025 SaaS Breaches Start with Tokens – What Security Teams Must Watch Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen…
Security2 Min Read October 9, 2025 Hacktivists target critical infrastructure, hit decoy plant A pro-Russian hacktivist group called TwoNet pivoted in less than a year from launching distributed denial-of-service (DDoS) attacks to…
Network2 Min Read October 9, 2025 All SonicWall Cloud Backup Users Have Firewall Configuration Files Stolen SonicWall has confirmed that an unauthorized actor has accessed firewall configuration backup files for all customers who have used its cloud…
Uncategorized2 Min Read October 9, 2025 ICO’s £7.5m Clearview AI Fine a Step Closer After Legal Victory The UK’s data protection watchdog has won its appeal against a controversial facial recognition technology firm, making a £7.5m…
Artificial Intelligence Malware2 Min Read October 9, 2025 From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025…
Uncategorized2 Min Read October 9, 2025 NCSC: Observability and Threat Hunting Must Improve UK organizations must improve observability and threat hunting “in the vital pursuit of raising the national ability” to detect…
Malware Ransomware Vulnerabilities Windows3 Min Read October 9, 2025 High Number of Windows 10 Users Remain as End-of-Life Looms A significant proportion individual users and organizations still run the Windows 10 operating system, just days before it reaches its…
Vulnerability Website Security2 Min Read October 9, 2025 Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain…
Security3 Min Read October 9, 2025 Hackers claim Discord breach exposed data of 5.5 million users Discord says they will not be paying threat actors who claim to have stolen the data of 5.5 million unique users from the company's Zendesk…
Security4 Min Read October 8, 2025 New FileFix attack uses cache smuggling to evade security software A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
Security2 Min Read October 8, 2025 Qilin ransomware claims Asahi brewery attack, leaks data The Qilin ransomware group has claimed the attack on Japanese beer giant Asahi by adding the company to the list of victims on its data leak…
Microsoft2 Min Read October 8, 2025 Microsoft 365 outage blocks access to Teams, Exchange Online Microsoft is working to resolve an ongoing outage preventing users from accessing Microsoft 365 services, including Microsoft Teams,…
Microsoft2 Min Read October 8, 2025 Microsoft enables Exchange Online auto-archiving by default Microsoft is enabling threshold-based auto-archiving by default in Exchange Online to prevent email flow issues caused by mailboxes filling up…
Cloud Security2 Min Read October 8, 2025 Crimson Collective hackers target AWS cloud instances for data theft The 'Crimson Collective' threat group has been targeting AWS (Amazon Web Services) cloud environments for the past weeks, to steal data…
Data Security Malware4 Min Read October 8, 2025 Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
Children Cyber Attack Cyber Crime Cybersecurity Kido Nursery Privacy United Kingdom2 Min Read October 8, 2025 UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack The UK Metropolitan Police (Met) have arrested two 17-year-old boys in connection with the major ransomware attack that compromised the data…
Security2 Min Read October 8, 2025 Hackers exploit auth bypass in Service Finder WordPress theme Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass…
Education Security2 Min Read October 8, 2025 London police arrests suspects linked to nursery breach, child doxing The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack…
DDoS Exploits Vulnerabilities Windows3 Min Read October 8, 2025 Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
Linux Ransomware Vulnerabilities Windows25 Min Read October 8, 2025 Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the…
Malware Threat Intelligence2 Min Read October 8, 2025 Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it…
Data Breach Network Windows4 Min Read October 8, 2025 Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and…
Cloud Security Malware Ransomware Windows2 Min Read October 8, 2025 Nezha Tool Used in New Cyber Campaign Targeting Web Applications A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
Apple Exploits Vulnerabilities2 Min Read October 8, 2025 Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and…
Cloud Security DDoS Phishing Ransomware3 Min Read October 8, 2025 Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000 Google has unveiled a new AI Vulnerability Reward Program (VRP), offering payouts of up to $30,000 for researchers who successfully identify…
Cyber Attacks Password Security1 Min Read October 8, 2025 Step Into the Password Graveyard… If You Dare (and Join the Live Session) Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don't need…
Cybercrime Malware3 Min Read October 8, 2025 LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring…
Phishing Ransomware2 Min Read October 8, 2025 Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue A sharp rise in digital fraud is costing companies worldwide an average of 7.7% of annual revenue, according to TransUnion’s H2 2025…
Cloud Security Linux Vulnerabilities Windows2 Min Read October 8, 2025 Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to non-administrator…
AI Artificial Intelligence ChatGPT Cyber Crime Cybersecurity FraudGPT MatrixPDF OpenAI Security SpamGPT WormGPT4 Min Read October 8, 2025 OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more…
Software Security Vulnerability3 Min Read October 8, 2025 Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol…
Exploits Vulnerabilities2 Min Read October 8, 2025 PoC Exploit Released for Critical Lua Engine Vulnerabilities Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
Ransomware Supply Chain2 Min Read October 8, 2025 Cyber-Attack Contributes to Huge Sales Drop at JLR Jaguar Land Rover (JLR) has revealed a 25% drop in volume sales in the three months up to September 30, largely as a result of the ongoing…
Cybersecurity Discord Identity theft Infostealer Malware Point Wild Privacy Security Shuyal Stealer Windows3 Min Read October 8, 2025 New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have found a new infostealer called Shuyal Stealer, a malware…
Ransomware Social Engineering2 Min Read October 8, 2025 Bybit Theft Drives Record-Breaking $2bn Haul for North Korea North Korea-backed threat actors have stolen more than $2bn in cryptocurrency this year to fund the hermit state’s missile and nuclear…
Ransomware2 Min Read October 8, 2025 Met Police Arrest Two Teens in Connection with Kido Attack Two teenaged boys have been arrested following a cyber-attack and attempted extortion of a London nursery group, the Metropolitan Police has…