Artificial Intelligence Vulnerability2 Min Read November 1, 2025 ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a …
2 Min Read October 31, 2025 OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically OpenAI has announced the launch of an "agentic security researcher"… Artificial Intelligence Code Security
3 Min Read October 31, 2025 Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack A suspected nation-state threat actor has been linked to the… Browser Security Malware
3 Min Read October 31, 2025 China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats A China-affiliated threat actor known as UNC6384 has been linked to a… Malware Threat Intelligence
Data Breach Phishing Ransomware2 Min Read September 8, 2025 Wealthsimple Confirms Data Breach After Supply Chain Attack Canadian fintech firm Wealthsimple has confirmed a data breach that exposed sensitive customer information. The incident, detected on August…
Encryption Malvertising3 Min Read September 8, 2025 GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver…
Ransomware4 Min Read September 8, 2025 Quantum Computing is Coming: Enterprises Need to Prepare Now Quantum computing is coming. When? No one knows for sure. Some experts say 10 years, others say 15 to 20 years. Many believe quantum computers…
Malware Phishing Ransomware Windows2 Min Read September 8, 2025 MostereRAT Targets Windows Users With Stealth Tactics A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan…
Network Ransomware Vulnerabilities Windows2 Min Read September 8, 2025 Remote Access Abuse Biggest Pre-Ransomware Indicator Abuses of remote access software and services are the most common ‘pre-ransomware’ indicators, according to new research from…
Ransomware4 Min Read September 8, 2025 Finding Agility in Post Quantum Encryption (PQC) In an era where data security is paramount, current encryption algorithms are sufficient to safeguard sensitive information. However, the…
Cloud Security Network3 Min Read September 8, 2025 Qualys, Tenable Latest Victims of Salesloft Drift Hack Cybersecurity providers Tenable and Qualys are the latest in a growing list of companies affected by a significant supply chain attack…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Cloud Security2 Min Read September 8, 2025 GhostAction Supply Chain Attack Compromises 3000+ Secrets Hundreds of GitHub users and repositories have been hit by another supply chain attack, in which threat actors have already stolen more than…
Artificial Intelligence6 Min Read September 8, 2025 You Didn’t Get Phished — You Onboarded the Attacker When Attackers Get Hired: Today’s New Identity Crisis What if the star engineer you just hired isn’t actually an employee, but an…
Malware Ransomware Vulnerabilities2 Min Read September 8, 2025 SAP S/4HANA Users Urged to Patch Critical Exploited Bug Security experts have warned SAP S/4HANA cloud customers that a critical code injection vulnerability patched by the vendor in August is being…
Cyber Espionage Malware4 Min Read September 6, 2025 Noisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity,…
Cryptocurrency Software Security2 Min Read September 6, 2025 Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys A new set of four malicious packages have been discovered in the npm package registry with capabilities to steal cryptocurrency wallet…
Threat Intelligence Vulnerability4 Min Read September 5, 2025 CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the…
Botnet Malware4 Min Read September 5, 2025 TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan…
Enterprise Security Vulnerability2 Min Read September 5, 2025 SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in…
Security Operations4 Min Read September 5, 2025 Automation Is Redefining Pentest Delivery Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat…
Cryptocurrency Malware3 Min Read September 5, 2025 VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing…
Cybersecurity Malware3 Min Read September 4, 2025 Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks…
Data Breach Malware4 Min Read September 4, 2025 GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to…
Artificial Intelligence Malware2 Min Read September 4, 2025 Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X’s malvertising…
Uncategorized3 Min Read September 4, 2025 Google Fined $379 Million by French Regulator for Cookie Consent Violations The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (€325 million) and $175 million…
Network Security Vulnerability2 Min Read September 4, 2025 CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting TP-Link wireless routers to…
Malware2 Min Read September 3, 2025 Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum…
Artificial Intelligence Vulnerability2 Min Read September 3, 2025 Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike AI to exploit…
Data Protection4 Min Read September 3, 2025 Detecting Data Leaks Before Disaster In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1…
Mobile Security Vulnerability2 Min Read September 3, 2025 Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September…
Cyber Espionage Data Breach2 Min Read September 3, 2025 Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats An Iran-nexus group has been linked to a “coordinated” and “multi-wave” spear-phishing campaign targeting the…
Network Security Threat Intelligence4 Min Read September 3, 2025 Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service (DDoS) attack that peaked at…
Mobile Security Vulnerability2 Min Read September 3, 2025 CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity security flaw impacting TP-Link TL-WA855RE…
Data Breach2 Min Read September 3, 2025 Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations Salesloft on Tuesday announced that it’s taking Drift temporarily offline “in the very near future,” as multiple companies…
Malware Threat Intelligence2 Min Read September 2, 2025 Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE The North Korea-linked threat actor known as the Lazarus Group has been attributed to a social engineering campaign that distributes three…
Cyber Espionage Network Security2 Min Read September 2, 2025 Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control Cybersecurity researchers have disclosed a stealthy new backdoor called MystRodX that comes with a variety of features to capture sensitive…
Uncategorized3 Min Read September 2, 2025 Shadow AI Discovery: A Critical Part of Enterprise AI Governance The Harsh Truths of AI Adoption MITs State of AI in Business report revealed that while 40% of organizations have purchased enterprise LLM…
Botnet Cyber Attack4 Min Read September 2, 2025 Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices Cybersecurity researchers have flagged a Ukrainian IP network for engaging in massive brute-force and password spraying campaigns targeting…
Uncategorized4 Min Read September 2, 2025 Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The threat actor known as Silver Fox has been attributed to abuse of a previously unknown vulnerable driver associated with WatchDog…
Cryptocurrency Malware2 Min Read September 2, 2025 Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop apps…
Malvertising Mobile Security3 Min Read September 1, 2025 Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used…
Uncategorized19 Min Read September 1, 2025 ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update,…
Browser Security Threat Intelligence5 Min Read September 1, 2025 When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of…
Malware3 Min Read September 1, 2025 ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka…
Cloud Security DDoS Linux Ransomware Windows2 Min Read September 1, 2025 Another Ryzen 9000 CPU Burnout: What’s Really Going On? Ddos September 1, 2025 Earlier this year, reports emerged of Asrock motherboards paired with processors such as the 9800X3D suffering…