SaaS Security Social Engineering3 Min Read January 31, 2026 Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed…
Email Security Vulnerability2 Min Read January 30, 2026 SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in…
Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
AI Security Malware4 Min Read January 28, 2026 Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Cyber Espionage Endpoint Security3 Min Read January 28, 2026 Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in…
Enterprise Security Password Security4 Min Read January 28, 2026 Password Reuse in Disguise: An Often-Missed Risky Workaround When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These…
Cybersecurity Malware3 Min Read December 31, 2025 Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight…
Malware Phishing3 Min Read December 30, 2025 Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a…
Cloud Security Threat Intelligence3 Min Read December 29, 2025 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…
Access Control Password Management4 Min Read December 24, 2025 Attacks are Evolving: 3 Ways to Protect Your Business in 2026 Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a business network, extracting sensitive data, and…
Browser Security Enterprise Security3 Min Read December 23, 2025 Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that…
Enterprise Software Password Security5 Min Read December 23, 2025 Passwd: A walkthrough of the Google Workspace Password Manager Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password…
Cybersecurity Hacking News17 Min Read December 22, 2025 ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust…
Cyber Espionage Malware3 Min Read December 21, 2025 Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years…
Cloud Security Cybersecurity2 Min Read December 19, 2025 Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal…
Cybercrime Law Enforcement2 Min Read December 19, 2025 Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks Authorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects" who are alleged to have been involved in…
Cybersecurity Hacking News11 Min Read December 18, 2025 ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in…
Cryptocurrency Cyber Espionage4 Min Read December 18, 2025 North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft Threat actors with ties to the Democratic People's Republic of Korea (DPRK or North Korea) have been instrumental in driving a surge in global…
Malware Mobile Security4 Min Read December 18, 2025 Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called…
Network Security Vulnerability3 Min Read December 18, 2025 Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus…
Email Security Threat Intelligence2 Min Read December 17, 2025 APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a "sustained" credential-harvesting…
Endpoint Security Threat Intelligence5 Min Read December 17, 2025 Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time Modern security teams often feel like they're driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs…
Cloud Security Vulnerability3 Min Read December 16, 2025 Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Email Security Malware6 Min Read December 12, 2025 New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Automation Compliance4 Min Read December 11, 2025 The Impact of Robotic Process Automation (RPA) on Identity and Access Management As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool…
Malware Vulnerability3 Min Read December 10, 2025 Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
Malware Vulnerability4 Min Read December 9, 2025 North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in…
Cybersecurity Password Security3 Min Read December 8, 2025 How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns…
Patch Management Vulnerability3 Min Read December 6, 2025 Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server…
Mobile Security Zero Day5 Min Read December 5, 2025 Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery A human rights lawyer from Pakistan's Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first…
Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Malware Mobile Security4 Min Read December 1, 2025 New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a "full spectrum" of features to…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Malware Supply Chain4 Min Read November 26, 2025 Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the…
Cloud Security Vulnerability3 Min Read November 24, 2025 Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Cloud Security Cyber Espionage3 Min Read November 22, 2025 China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information…
Malware Mobile Security3 Min Read November 20, 2025 New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device…