Cyber Attack Malware4 Min Read November 19, 2025 Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking…
Cyber Espionage Malware3 Min Read November 18, 2025 Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued…
Enterprise Security Zero Trust8 Min Read November 18, 2025 Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF,…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cloud Security Social Engineering6 Min Read November 17, 2025 5 Reasons Why Attackers Are Phishing Over LinkedIn Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
AI Security Cyber Espionage3 Min Read November 14, 2025 Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber…
Online Fraud Payment Security4 Min Read November 13, 2025 Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year.…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Password Security Threat Detection4 Min Read November 12, 2025 Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD's importance has grown as companies adopt…
Cyber Espionage Malware5 Min Read November 7, 2025 From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term…
Cloud Security Data Protection4 Min Read November 7, 2025 Enterprise Credentials at Risk – Same Old, Same Old? Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…
Malware Vulnerability3 Min Read November 6, 2025 Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks…
Cybersecurity Hacking News11 Min Read November 6, 2025 ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized…
Malware Network Security2 Min Read November 6, 2025 Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and…
Cloud Security Incident Response2 Min Read November 6, 2025 SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure…
Cyber Espionage Cybersecurity3 Min Read November 5, 2025 Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting…
Cybercrime Supply Chain Attack2 Min Read November 3, 2025 Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Malware Mobile Security3 Min Read November 3, 2025 Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting…
Cybercrime Malware2 Min Read October 30, 2025 Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are…
Cybersecurity Hacking News12 Min Read October 30, 2025 ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact…
Internet of Things Vulnerability3 Min Read October 29, 2025 Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Cybersecurity researchers are calling attention to a spike in automated attacks targeting PHP servers, IoT devices, and cloud gateways by…
Artificial Intelligence Data Breach4 Min Read October 29, 2025 Preparing for the Digital Battlefield of 2026: Ghost Identities, Poisoned Accounts, & AI Agent Havoc BeyondTrust's annual cybersecurity predictions point to a year where old defenses will fail quietly, and new attack vectors will surge.…
Malware Threat Intelligence2 Min Read October 29, 2025 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux Cybersecurity researchers have discovered a set of 10 malicious npm packages that are designed to deliver an information stealer targeting…
Malware Mobile Security2 Min Read October 28, 2025 New Android Trojan 'Herodotus' Outsmarts Anti-Fraud Systems by Typing Like a Human Cybersecurity researchers have disclosed details of a new Android banking trojan called Herodotus that has been observed in active campaigns…
Data Breach Malware6 Min Read October 28, 2025 Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall…
Cloud Security Data Protection5 Min Read October 28, 2025 Is Your Google Workspace as Secure as You Think it is? The New Reality for Lean Security Teams If you're the first security or IT hire at a fast-growing startup, you've likely inherited a mandate…
Malware Vulnerability4 Min Read October 28, 2025 Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from Italian…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
Ransomware Threat Intelligence3 Min Read October 27, 2025 Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start…
Cyber Espionage Malware3 Min Read October 24, 2025 APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a…
Artificial Intelligence Data Protection2 Min Read October 23, 2025 Secure AI at Scale and Speed — Learn the Framework in this Free Webinar AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you're in security, that…
Cybersecurity Hacking News3 Min Read October 23, 2025 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse…
Data Protection DevOps2 Min Read October 23, 2025 Why Organizations Are Abandoning Static Secrets for Managed Identities As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials.…
Cyber Espionage Malware1 Min Read October 22, 2025 Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to…
Cyber Espionage Vulnerability2 Min Read October 22, 2025 Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company…
Data Breach Enterprise Security4 Min Read October 22, 2025 Why You Should Swap Passwords for Passphrases The advice didn't change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords…
Artificial Intelligence Security Operations4 Min Read October 21, 2025 Securing AI to Benefit from AI Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It…
Cyber Espionage Threat Intelligence3 Min Read October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025,…
Data Breach Phishing Ransomware Vulnerabilities2 Min Read October 20, 2025 Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More It's easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show…
Browser Security Malvertising2 Min Read October 20, 2025 Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a…