Network Ransomware Vulnerabilities Windows2 Min Read September 8, 2025 Remote Access Abuse Biggest Pre-Ransomware Indicator Abuses of remote access software and services are the most common ‘pre-ransomware’ indicators, according to new research from…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Data Breach Malware4 Min Read September 4, 2025 GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to…
Uncategorized19 Min Read September 1, 2025 ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update,…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
DDoS Network Vulnerabilities2 Min Read August 28, 2025 Cisco Nexus 3000 and 9000 Series Vulnerability Let Attackers Trigger DoS Attack Cisco has issued a High-severity security advisory alerting customers to a critical vulnerability in the Intermediate System-to-Intermediate…
Network Phishing Vulnerabilities3 Min Read August 28, 2025 Cisco IMC Virtual Keyboard Video Monitor Let Attacker Direct User to Malicious Website Cisco disclosed a high-severity open redirect vulnerability in the Virtual Keyboard Video Monitor (vKVM) component of its Integrated…
Cyber Espionage Network Security4 Min Read August 28, 2025 Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world,…
Network2 Min Read August 28, 2025 Netherlands Confirms China's Salt Typhoon Targeted Small Dutch Telcos Dutch intelligence agencies have revealed that the Chinese hacking group Salt Typhoon targeted organizations in the Netherlands. In a joint…
Network Ransomware Vulnerabilities3 Min Read August 28, 2025 UK and US Blame Three Chinese Tech Firms for Global Cyberattacks A coalition of international cybersecurity agencies led by the UK’s National Cyber Security Centre (NCSC) has publicly linked three…
Apple Network Phishing Vulnerabilities3 Min Read August 28, 2025 Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns The UK, US and partners from across the globe have released a new report on the notorious Chinese APT group Salt Typhoon, claiming it has…
Apple Linux Malware Network Vulnerabilities3 Min Read August 28, 2025 CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors The U.S. Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI, and a broad coalition of international partners, has…
DDoS Network Ransomware Vulnerabilities2 Min Read August 28, 2025 Cisco Warns of High-Severity DoS Flaw (CVE-2025-20241) in Nexus Switches Ddos August 28, 2025 Cisco Systems has published a security advisory detailing a high-severity denial-of-service (DoS) vulnerability affecting…
Apple Linux Network3 Min Read August 28, 2025 Chinese State Hackers Target Global Critical Infrastructure, NSA Warns A coalition of cybersecurity and intelligence agencies from across the globe, including the United States National Security Agency (NSA), has…
Malware3 Min Read August 28, 2025 ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia…
Security3 Min Read August 28, 2025 Global Salt Typhoon hacking campaigns linked to Chinese tech firms The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have…
Security3 Min Read August 27, 2025 Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks Update: Story updated with further information. Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from…
Security2 Min Read August 26, 2025 Farmers Insurance data breach impacts 1.1M people after Salesforce attack U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the…
Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Android Apple Cloud Security DDoS Network Phishing Privacy & Compliance Vulnerabilities4 Min Read August 25, 2025 Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by…
Cybersecurity Recap22 Min Read August 25, 2025 Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage,…
Data Breach6 Min Read August 25, 2025 How to Develop a Business Continuity Plan for Cyber Security: A Step-by-Step Guide The figures are appalling – 60% of small businesses fail within six months of a cyber-attack. Cyber attackers are all around us, and…
Malware3 Min Read August 25, 2025 Fake Reservation Links Prey on Weary Travelers Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked…
Malware Open Source3 Min Read August 25, 2025 Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure entities in Taiwan using customized…
Network Security Vulnerability2 Min Read August 25, 2025 Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could…
Cryptocurrency Malvertising3 Min Read August 25, 2025 New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with a multi-stage malware…
Vulnerability Zero-Day4 Min Read August 25, 2025 Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been…
Security1 Min Read August 25, 2025 FBI warns of Russian hackers exploiting 7-year-old Cisco flaw The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia’s Federal Security Service (FSB) are targeting…
Apple Malware3 Min Read August 25, 2025 Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw A seven-year-old vulnerability affecting end-of-life Cisco network devices is being exploited by a Russian state-sponsored cyber espionage…