Data Breach Phishing Ransomware Vulnerabilities2 Min Read October 20, 2025 Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More It's easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show…
Cybercrime Threat Intelligence2 Min Read October 18, 2025 New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a…
Blockchain Malware3 Min Read October 17, 2025 North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its…
Cybercrime Malware2 Min Read October 17, 2025 Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently…
Blockchain Malware2 Min Read October 16, 2025 North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique…
Malware Vulnerability2 Min Read October 16, 2025 LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit…
Data Breach Malware Vulnerabilities Windows3 Min Read October 16, 2025 Operation Zero Disco: Critical Cisco SNMP Flaw (CVE-2025-20352) Used to Implant Linux Rootkits on Switches researchers from Trend Research have uncovered a sophisticated campaign — dubbed “Operation Zero Disco” — in which…
Cyber Espionage Threat Intelligence3 Min Read October 15, 2025 Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the…
Malware Software Supply Chain3 Min Read October 15, 2025 Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by…
Apple Malware Ransomware Vulnerabilities4 Min Read October 15, 2025 Sekoia Exposes PolarEdge Backdoor: Custom mbedTLS C2 Compromising Cisco, QNAP, and Synology Devices Sekoia Threat Detection & Response (TDR) researchers have published an in-depth technical analysis of the PolarEdge Backdoor, a stealthy…
Malware Network Ransomware Vulnerabilities2 Min Read October 14, 2025 PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication A sophisticated backdoor malware targeting Internet of Things devices has surfaced, employing advanced communication techniques to maintain…
Cyber Espionage Network Security2 Min Read October 14, 2025 Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for…
Security2 Min Read October 14, 2025 Chinese hackers abuse geo-mapping tool for year-long persistence Chinese state hackers remained undetected in a target environment for more than a year by turning a component in the ArcGIS geo-mapping tool…
Malware Typosquatting3 Min Read October 14, 2025 npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a…
Cloud Security Exploits Malware Vulnerabilities3 Min Read October 14, 2025 Stealth C2: Hackers Abuse Discord Webhooks for Covert Data Exfiltration in npm, PyPI, and RubyGems Supply Chain Attacks The Socket Threat Research Team has uncovered a growing trend among malicious package developers: leveraging Discord webhooks as…
Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Browser Security Windows Security2 Min Read October 13, 2025 Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving "credible reports" in August 2025 that…
Ransomware Windows Security2 Min Read October 13, 2025 New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Data Breach Malware Ransomware Vulnerabilities4 Min Read October 10, 2025 CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882) Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
Artificial Intelligence Cyber Espionage1 Min Read October 9, 2025 From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and…
Artificial Intelligence Malware2 Min Read October 9, 2025 From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025…
Cloud Security Malware Ransomware Windows2 Min Read October 8, 2025 Nezha Tool Used in New Cyber Campaign Targeting Web Applications A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
Artificial Intelligence Threat Intelligence5 Min Read October 8, 2025 OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…
Data Breach Phishing Ransomware Vulnerabilities6 Min Read October 7, 2025 ShinyHunters Wage Broad Corporate Extortion Spree A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…
Malware Network Ransomware Vulnerabilities5 Min Read October 7, 2025 CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882) CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now tracked as…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 7, 2025 CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as…
backdoor Botnet cve-2025-49844 exploit Malware Microsoft Ransomware3 Min Read October 6, 2025 Redis warns of critical flaw impacting thousands of instances The Redis security team has released patches for a maximum severity vulnerability that could allow attackers to gain remote code execution on…
Security4 Min Read October 6, 2025 XWorm malware resurfaces with ransomware module, over 35 plugins New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Android Apple backdoor C2 Cisco command-and-control Malware Microsoft Mobile VPN Windows2 Min Read October 6, 2025 Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine…
Botnet Malware4 Min Read October 3, 2025 Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's…
Cybersecurity Malware3 Min Read October 3, 2025 New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT A threat actor that's known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Cyber Espionage Malware2 Min Read October 2, 2025 Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like…
Malware Phishing Ransomware Windows2 Min Read October 2, 2025 Confucius Shifts from Document Stealers to Python Backdoors A long-running cyber-espionage group known as Confucius has introduced new techniques in its campaigns against Microsoft Windows users. First…
Malware Python3 Min Read October 2, 2025 Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Blackpoint Cyber Cyber Attack Cybersecurity Fraud Malware Phishing Phishing Scam PowerShell Scam Security Windows3 Min Read October 2, 2025 Malicious ZIP Files Use Windows Shortcuts to Drop Malware A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’ trust…