Ransomware Windows Security2 Min Read October 13, 2025 New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Data Breach Malware Ransomware Vulnerabilities4 Min Read October 10, 2025 CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882) Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
Artificial Intelligence Cyber Espionage1 Min Read October 9, 2025 From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and…
Artificial Intelligence Malware2 Min Read October 9, 2025 From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025…
Cloud Security Malware Ransomware Windows2 Min Read October 8, 2025 Nezha Tool Used in New Cyber Campaign Targeting Web Applications A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
Artificial Intelligence Threat Intelligence5 Min Read October 8, 2025 OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…
Data Breach Phishing Ransomware Vulnerabilities6 Min Read October 7, 2025 ShinyHunters Wage Broad Corporate Extortion Spree A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…
Malware Network Ransomware Vulnerabilities5 Min Read October 7, 2025 CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882) CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now tracked as…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 7, 2025 CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as…
backdoor Botnet cve-2025-49844 exploit Malware Microsoft Ransomware3 Min Read October 6, 2025 Redis warns of critical flaw impacting thousands of instances The Redis security team has released patches for a maximum severity vulnerability that could allow attackers to gain remote code execution on…
Security4 Min Read October 6, 2025 XWorm malware resurfaces with ransomware module, over 35 plugins New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Android Apple backdoor C2 Cisco command-and-control Malware Microsoft Mobile VPN Windows2 Min Read October 6, 2025 Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine…
Botnet Malware4 Min Read October 3, 2025 Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's…
Cybersecurity Malware3 Min Read October 3, 2025 New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT A threat actor that's known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Cyber Espionage Malware2 Min Read October 2, 2025 Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like…
Malware Phishing Ransomware Windows2 Min Read October 2, 2025 Confucius Shifts from Document Stealers to Python Backdoors A long-running cyber-espionage group known as Confucius has introduced new techniques in its campaigns against Microsoft Windows users. First…
Malware Python3 Min Read October 2, 2025 Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Blackpoint Cyber Cyber Attack Cybersecurity Fraud Malware Phishing Phishing Scam PowerShell Scam Security Windows3 Min Read October 2, 2025 Malicious ZIP Files Use Windows Shortcuts to Drop Malware A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’ trust…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Cyber Attack Cyber Crime Cybersecurity Detour Dog DNS Infostealer Los Pollos Malware Security Strela Stealer2 Min Read October 1, 2025 Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer New research from Infoblox Threat Intel has revealed that an established, persistent group of cybercriminals, Detour Dog, has been silently…
APT Groups Malware Network Windows3 Min Read October 1, 2025 New China-Aligned Hackers Hit State and Telecom Sectors A newly identified cyber espionage group has been targeting government and telecommunications organizations across Africa, the Middle East and…
Incident Response Malware2 Min Read October 1, 2025 Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called…
Malware Network Vulnerabilities Windows3 Min Read October 1, 2025 Backdoor Disguised as SOCKS5 Proxy: Malicious PyPI Package SoopSocks Grants Root Access The of the open-source software supply chain was once again tested when JFrog’s research team uncovered a malicious package on PyPI. The…
Afghanistan China Cyber Attack Cyber Attacks Cybersecurity IIServerCore Malware Mustang Panda NET-STAR Pakistan Phantom Taurus Security Winnti2 Min Read September 30, 2025 Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years Researchers at Palo Alto Networks say a Chinese-linked cyberespionage group has been targeting foreign ministries, embassies, and…
Cyber Espionage Malware3 Min Read September 30, 2025 Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously…
Malware Phishing Vulnerabilities Windows3 Min Read September 29, 2025 China-linked RedNovember Campaign Shows Importance of Patching Edge Devices A long-running threat campaign linked to a Chinese state-sponsored cyber-espionage group highlights the importance of patching and protecting…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data A sophisticated malware campaign has emerged that weaponizes seemingly legitimate productivity tools to infiltrate systems and steal sensitive…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
MCP Server Vulnerability2 Min Read September 29, 2025 First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted…
Malware Ransomware Vulnerabilities Windows3 Min Read September 29, 2025 RedNovember: Chinese APT Expands Global Espionage to U.S. Defense, Aerospace, and Tech Firms A new report from Recorded Future’s Insikt Group reveals that the Chinese state-sponsored threat group RedNovember has significantly…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 29, 2025 Morte Botnet Unveiled: A Rapidly Growing Loader-as-a-Service Campaign Exploiting Routers and Enterprise Apps Researchers at CloudSEK Threat Intelligence (TRIAD) have exposed a sophisticated botnet operation that systematically compromises SOHO…
Data Breach Malware Vulnerabilities Windows8 Min Read September 28, 2025 Prompt Injection and Model Poisoning: The New Plagues of AI Security You wake up. Your AI wakes up. Somewhere, a stranger types a sentence, and your AI listens. This is not science fiction. This is the…
Data Breach Phishing Ransomware Vulnerabilities12 Min Read September 28, 2025 Cybersecurity Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the…
Security2 Min Read September 27, 2025 Fake Microsoft Teams installers push Oyster malware via malvertising Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers that infect…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…