Security2 Min Read October 9, 2025 Hackers now use Velociraptor DFIR tool in ransomware attacks Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and…
Data Breach Network Windows4 Min Read October 8, 2025 Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and…
AI Artificial Intelligence ChatGPT Cyber Crime Cybersecurity FraudGPT MatrixPDF OpenAI Security SpamGPT WormGPT4 Min Read October 8, 2025 OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more…
Security3 Min Read October 8, 2025 Salesforce refuses to pay ransom over widespread data theft attacks Salesforce has confirmed that it will not negotiate with or pay a ransom to the threat actors behind a massive wave of data theft attacks that…
Exploits Network Vulnerabilities2 Min Read October 7, 2025 Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass – PoC Released Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…
Data Breach DDoS Phishing Ransomware3 Min Read October 6, 2025 Ransomware Group “Trinity of Chaos” Launches Data Leak Site A new data leak site hosted on the TOR network has been launched by the “Trinity of Chaos” – a ransomware collective…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Security2 Min Read October 4, 2025 Massive surge in scans targeting Palo Alto Networks login portals A spike in suspicious scans targeting Palo Alto Networks login portals indicates clear reconnaissance efforts from suspicious IP addresses,…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Network Security Vulnerability1 Min Read October 4, 2025 Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login…
Cyber Attack Cyber Crime Cybersecurity Extortion Ransom Security3 Min Read October 3, 2025 Scattered LAPSUS$ Hunters Claim Salesforce Breach, 1B Records, 39 Firms Listed A new leak site has gone live, operated by the notorious group calling itself “Scattered Lapsus$ Hunters,” (a coalition that…
Android Apple Malware Vulnerabilities2 Min Read October 3, 2025 Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to…
Security3 Min Read October 3, 2025 ShinyHunters launches Salesforce data leak site to extort 39 victims An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches,…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
DDoS Malware Network Vulnerabilities2 Min Read October 2, 2025 Critical Flaw CVE-2025-52906 (CVSS 9.3) Allows Unauthenticated RCE on TOTOLINK X6000R Routers Researchers from Unit 42, Palo Alto Networks’ threat intelligence team, have disclosed three newly discovered in the firmware of the…
Exploits Network Ransomware Vulnerabilities3 Min Read October 1, 2025 'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover A 9.9 out of 10 severity bug in Red Hat's OpenShift AI service could allow a remote attacker with minimal authentication to steal data,…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Apple Botnets Network Vulnerabilities2 Min Read October 1, 2025 CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports…
Apple Malware Network Vulnerabilities2 Min Read October 1, 2025 Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…
Security2 Min Read September 30, 2025 Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws Roughly 50,000 Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) appliances exposed on the public web are vulnerable…
Apple Malware Network Vulnerabilities2 Min Read September 30, 2025 Warnings about Cisco vulns under active exploit are falling on deaf ears Nearly 50,000 Cisco ASA/FTD instances vulnerable to two bugs that are actively being exploited by "advanced" attackers remain exposed to the…
DDoS Linux Ransomware Vulnerabilities3 Min Read September 30, 2025 CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog The threat landscape continues to evolve rapidly and staying ahead of actively exploited vulnerabilities is key to effective cybersecurity…
Linux Vulnerability2 Min Read September 30, 2025 CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line…
Malware Phishing Vulnerabilities Windows3 Min Read September 29, 2025 China-linked RedNovember Campaign Shows Importance of Patching Edge Devices A long-running threat campaign linked to a Chinese state-sponsored cyber-espionage group highlights the importance of patching and protecting…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
Malware Network Ransomware Vulnerabilities10 Min Read September 29, 2025 Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild The cybersecurity landscape experienced a significant escalation in September 2025, when Cisco disclosed multiple critical zero-day…
Linux Ransomware Vulnerabilities Windows2 Min Read September 29, 2025 Akira Ransomware Exploits SonicWall VPN Accounts With Lightning-Fast Intrusions Akira ransomware Leaksite Arctic Wolf has observed a major uptick in Akira ransomware activity since late July 2025, with attackers…
Malware Ransomware Vulnerabilities Windows3 Min Read September 29, 2025 RedNovember: Chinese APT Expands Global Espionage to U.S. Defense, Aerospace, and Tech Firms A new report from Recorded Future’s Insikt Group reveals that the Chinese state-sponsored threat group RedNovember has significantly…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 29, 2025 Morte Botnet Unveiled: A Rapidly Growing Loader-as-a-Service Campaign Exploiting Routers and Enterprise Apps Researchers at CloudSEK Threat Intelligence (TRIAD) have exposed a sophisticated botnet operation that systematically compromises SOHO…
Data Breach Phishing Ransomware Vulnerabilities12 Min Read September 28, 2025 Cybersecurity Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the…
Malware Phishing Vulnerabilities Windows5 Min Read September 28, 2025 Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How Juventus protects fans,…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…
Malware Ransomware Vulnerabilities Windows5 Min Read September 27, 2025 Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June…
Apple Malware Ransomware Vulnerabilities3 Min Read September 26, 2025 ‘An attacker's playground:’ Crims exploit GoAnywhere perfect-10 bug Security researchers have confirmed that threat actors have exploited the maximum-severity vulnerability affecting Fortra's GoAnywhere managed…
Apple Malware Network Vulnerabilities2 Min Read September 26, 2025 Critical Cisco SSL VPN Vulnerabilities The cybersecurity world is on alert after multiple critical vulnerabilities were discovered in Cisco SSL VPN solutions, specifically affecting…
Malware Network Ransomware Vulnerabilities3 Min Read September 26, 2025 Agencies Around the Globe Urge Patching of Cisco ASA Bug Under Active Exploit The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-03 in response to an ongoing and severe…
Network Vulnerabilities1 Min Read September 26, 2025 CISA Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 25-03: Identify…
Apple Malware Network Vulnerabilities3 Min Read September 26, 2025 Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been…
Malware Network Ransomware Vulnerabilities4 Min Read September 26, 2025 ArcaneDoor Threat Actor Resurfaces in Continued Attacks Against Cisco Firewalls A newly identified cyber-attack campaign has exploited Cisco Adaptive Security Appliance (ASA) devices in a sophisticated operation linked to…
Exploits Malware Network Vulnerabilities2 Min Read September 26, 2025 CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day…