Cryptocurrency Encryption2 Min Read October 21, 2025 Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams Meta on Tuesday said it's launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it's introducing…
3 Min Read October 21, 2025 PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign Cybersecurity researchers have shed light on the inner workings of a… Malware Vulnerability
4 Min Read October 21, 2025 Securing AI to Benefit from AI Artificial intelligence (AI) holds tremendous promise for improving… Artificial Intelligence Security Operations
3 Min Read October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers A new malware attributed to the Russia-linked hacking group known as… Cyber Espionage Threat Intelligence
Malware Phishing Ransomware Windows4 Min Read October 10, 2025 ‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
Legal Security3 Min Read October 10, 2025 FBI takes down BreachForums portal used for Salesforce extortion The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as a portal for leaking…
DDoS Linux Malware Vulnerabilities3 Min Read October 10, 2025 Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot A Russia-aligned hacktivist gang has been tricked into targeting a honeypot disguised as a water treatment utility, cybersecurity company…
Exploits Vulnerabilities2 Min Read October 10, 2025 Gladinet CentreStack And Triofox 0-Day RCE Vulnerability Actively Exploited In Attacks An active in-the-wild exploitation of a zero-day vulnerability in Gladinet CentreStack and Triofox products. Tracked as CVE-2025-11371, the…
Data Breach Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day The cybersecurity landscape faces a new and significant threat as the notorious CL0P ransomware group has launched a large-scale extortion…
Malware Ransomware4 Min Read October 10, 2025 Senators Peters and Rounds Introduce Bipartisan Bill to Restore Cybersecurity Protections In a renewed push to safeguard America’s digital infrastructure, U.S. Senators Gary Peters (D-MI) and Mike Rounds (R-SD) have introduced…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Apple Vulnerabilities Windows4 Min Read October 10, 2025 October 2025 Patch Tuesday forecast: The end of a decade with Microsoft A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to…
Android Ransomware Vulnerabilities2 Min Read October 10, 2025 Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders For certain advanced users and developers, unlocking the Android operating system on their smartphones is a common practice. Once unlocked, it…
Data Breach Malware Ransomware Vulnerabilities4 Min Read October 10, 2025 CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882) Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
Exploits Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI Huntress has sounded the alarm over active exploitation of a newly discovered Local File Inclusion (LFI) in Gladinet CentreStack and Triofox…
Cloud Security DDoS Vulnerabilities Windows2 Min Read October 10, 2025 NVIDIA GPU Driver Patches Multiple High-Severity Flaws Risking RCE and Privilege Escalation NVIDIA has released an important software update for its GPU Display Driver, addressing multiple that could lead to code execution, privilege…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices…
Linux Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 DFIR Tool Hijacked: Ransomware Group Storm-2603 Abuses Velociraptor for Stealthy LockBit/Babuk Attacks Cisco Talos has confirmed that ransomware operators are now abusing Velociraptor, an open-source digital forensics and incident response…
Cloud Security Exploits Ransomware Vulnerabilities2 Min Read October 10, 2025 CISA Adds Grafana CVE-2021-43798 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
Mobile Security3 Min Read October 9, 2025 New Android spyware ClayRat imitates WhatsApp, TikTok, YouTube A new Android spyware called ClayRat is luring potential victims by posing as popular apps and services like WhatsApp, Google Photos, TikTok,…
Microsoft Security2 Min Read October 9, 2025 Microsoft: Hackers target universities in “payroll pirate” attacks A cybercrime gang tracked as Storm-2657 has been targeting university employees in the United States to hijack salary payments in "pirate…
Security2 Min Read October 9, 2025 Hackers now use Velociraptor DFIR tool in ransomware attacks Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and…
Microsoft2 Min Read October 9, 2025 Microsoft Defender mistakenly flags SQL Server as end-of-life Microsoft is working to resolve a known issue that causes its Defender for Endpoint enterprise endpoint security platform to…
Artificial Intelligence Cyber Espionage1 Min Read October 9, 2025 From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and…
Security2 Min Read October 9, 2025 RondoDox botnet targets 56 n-day flaws in worldwide attacks A new large-scale botnet called RondoDox is targeting 56 vulnerabilities in more than 30 distinct devices, including flaws first…
Malware Mobile Security3 Min Read October 9, 2025 New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike…
Microsoft2 Min Read October 9, 2025 Microsoft: Windows Backup now available for enterprise users Microsoft announced this week the general availability of Windows Backup for Organizations, a new enterprise-grade backup tool that helps…
Cloud Security2 Min Read October 9, 2025 SonicWall: Firewall configs stolen for all cloud backup customers SonicWall has confirmed that all customers that used the company's cloud backup service are affected by the security breach last month.…
Cloud Security Network Security2 Min Read October 9, 2025 Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the…
Malware Phishing2 Min Read October 9, 2025 Researchers Warn of Security Gaps in AI Browsers A new report by security researchers at SquareX Labs has identified several architectural security weaknesses in AI browsers, including…
IoT Security Ransomware4 Min Read October 9, 2025 Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025 There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven tech…
Microsoft2 Min Read October 9, 2025 Azure outage blocks access to Microsoft 365 services, admin portals Microsoft is working to resolve an outage affecting its Azure Front Door content delivery network (CDN), which is preventing customers from…
Android Malware Mobile Security Phishing2 Min Read October 9, 2025 ClayRat Spyware Campaign Targets Android Users in Russia A rapidly evolving Android spyware campaign known as “ClayRat” has been discovered targeting Russian users through Telegram…
Cybersecurity Hacking News1 Min Read October 9, 2025 ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to…
Identity Management SaaS Security5 Min Read October 9, 2025 SaaS Breaches Start with Tokens – What Security Teams Must Watch Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen…
Security2 Min Read October 9, 2025 Hacktivists target critical infrastructure, hit decoy plant A pro-Russian hacktivist group called TwoNet pivoted in less than a year from launching distributed denial-of-service (DDoS) attacks to…
Network2 Min Read October 9, 2025 All SonicWall Cloud Backup Users Have Firewall Configuration Files Stolen SonicWall has confirmed that an unauthorized actor has accessed firewall configuration backup files for all customers who have used its cloud…
Uncategorized2 Min Read October 9, 2025 ICO’s £7.5m Clearview AI Fine a Step Closer After Legal Victory The UK’s data protection watchdog has won its appeal against a controversial facial recognition technology firm, making a £7.5m…
Artificial Intelligence Malware2 Min Read October 9, 2025 From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025…
Uncategorized2 Min Read October 9, 2025 NCSC: Observability and Threat Hunting Must Improve UK organizations must improve observability and threat hunting “in the vital pursuit of raising the national ability” to detect…
Malware Ransomware Vulnerabilities Windows3 Min Read October 9, 2025 High Number of Windows 10 Users Remain as End-of-Life Looms A significant proportion individual users and organizations still run the Windows 10 operating system, just days before it reaches its…
Vulnerability Website Security2 Min Read October 9, 2025 Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain…
Security3 Min Read October 9, 2025 Hackers claim Discord breach exposed data of 5.5 million users Discord says they will not be paying threat actors who claim to have stolen the data of 5.5 million unique users from the company's Zendesk…
Security4 Min Read October 8, 2025 New FileFix attack uses cache smuggling to evade security software A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
Security2 Min Read October 8, 2025 Qilin ransomware claims Asahi brewery attack, leaks data The Qilin ransomware group has claimed the attack on Japanese beer giant Asahi by adding the company to the list of victims on its data leak…