Ransomware Supply Chain Vulnerabilities2 Min Read October 4, 2025 Clop Ransomware Targets Oracle E-Business Suite: Extortion Wave Hits Global Enterprises A new wave of extortion attacks linked to the Clop ransomware group has recently shaken organizations using Oracle E-Business Suite (EBS),…
Exploits Vulnerabilities2 Min Read October 3, 2025 Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated…
DevOps Enterprise Security5 Min Read October 3, 2025 Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing…
Cloud Security Data Breach Ransomware Vulnerabilities2 Min Read October 3, 2025 Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Red Hat, the world’s leading enterprise open-source software provider, has officially confirmed a significant security incident…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Android Apple Network Ransomware3 Min Read October 2, 2025 Free VPN Apps Found Riddled With Security Flaws A large-scale study of free virtual private network (VPN) apps has uncovered serious privacy and security risks that affect both consumers and…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
AI Artificial Intelligence Cybersecurity Ransomware Security SMB3 Min Read October 2, 2025 Small Businesses and Ransomware: Navigating the AI Era Threat Ransomware has evolved from a niche hacker tactic into a mainstream threat, and small businesses are increasingly in the crosshairs. While…
Cloud Security DDoS Vulnerabilities Web Security2 Min Read October 2, 2025 DoS Flaws in Argo CD: Unauthenticated Attackers Can Crash Kubernetes Server with Single Request The Argo CD project has released patches addressing several denial-of-service (DoS) that could allow attackers to crash the argocd-server…
Apple Vulnerabilities Web Security Windows2 Min Read October 2, 2025 CISA Warns of Critical RCE Flaw (CVE-2025-10659, CVSS 9.8) in Megasys Telenium Online Web Application The U.S. Cybersecurity and Infrastructure Agency (CISA) has issued a advisory warning of a critical in the Megasys Telenium Online Web…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Social Engineering Windows2 Min Read October 1, 2025 Shortcut-based Credential Lures Deliver DLL Implants A campaign that packages credential-themed ZIP archives with malicious Windows shortcut (.lnk) files has been tracked by cybersecurity…
Malware Mobile Security3 Min Read October 1, 2025 New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…
Security2 Min Read September 30, 2025 New MatrixPDF toolkit turns PDFs into phishing and malware lures A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into interactive lures that…
Exploits Nation-state Vulnerabilities Windows2 Min Read September 30, 2025 Chinese hackers exploiting VMware zero-day since October 2024 Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has…
Phishing Ransomware Vulnerabilities Windows2 Min Read September 30, 2025 Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web Veeam Backup & Replication, a cornerstone of many enterprises’ data protection strategy, has reportedly become the focus of a new…
Microsoft3 Min Read September 30, 2025 Windows 11 KB5065789 update released with 41 changes and fixes Microsoft has released the KB5065789 preview cumulative update for Windows 11 24H2, which includes 41 improvements, including…
AI Artificial Intelligence Fraud LLM Microsoft Phishing Phishing Scam Scam Security SVG3 Min Read September 30, 2025 Microsoft Flags AI Phishing Attack Hiding in SVG Files Forget the old, error-filled emails you could spot easily. Cybercriminals have completely upgraded their methods, using AI (Artificial…
Cybercrime Mobile Security4 Min Read September 30, 2025 New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO)…
Exploits Linux Malware Vulnerabilities7 Min Read September 29, 2025 You name it, VMware elevates it (CVE-2025-41244) On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service…
Exploits Phishing Windows2 Min Read September 29, 2025 AI-Generated Code Used in Phishing Campaign Blocked by Microsoft A credential phishing campaign that likely relied on AI-generated code to evade detection has been stopped by Microsoft Threat Intelligence.…
Botnets Network Ransomware Vulnerabilities3 Min Read September 29, 2025 Akira ransomware: From SonicWall VPN login to encryption in under four hours Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data A sophisticated malware campaign has emerged that weaponizes seemingly legitimate productivity tools to infiltrate systems and steal sensitive…
Network Ransomware Vulnerabilities2 Min Read September 29, 2025 SonicWall SSL VPN Attacks Escalate, Bypassing MFA Security experts have warned of a surge in malicious activity from Akira ransomware actors targeted at victims running SonicWall SSL VPN…
Linux Ransomware Vulnerabilities Windows2 Min Read September 29, 2025 Akira Ransomware Exploits SonicWall VPN Accounts With Lightning-Fast Intrusions Akira ransomware Leaksite Arctic Wolf has observed a major uptick in Akira ransomware activity since late July 2025, with attackers…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 29, 2025 Morte Botnet Unveiled: A Rapidly Growing Loader-as-a-Service Campaign Exploiting Routers and Enterprise Apps Researchers at CloudSEK Threat Intelligence (TRIAD) have exposed a sophisticated botnet operation that systematically compromises SOHO…
Security3 Min Read September 28, 2025 Akira ransomware breaching MFA-protected SonicWall VPN accounts Ongoing Akira ransomware attacks targeting SonicWall SSL VPN devices continue to evolve, with the threat actors found to be successfully…
Malware Phishing Ransomware3 Min Read September 28, 2025 AsyncRAT Malware Campaign Found Targeting South American Hotels A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…
Exploits Vulnerabilities Windows2 Min Read September 27, 2025 CVE-2025-59934: Critical Flaw in Formbricks Allows Unauthorized Password Resets via Forged JWT Tokens The Formbricks project, an open-source platform for building in-app and website surveys, has released an urgent patch addressing a critical…
Cryptocurrency Malware2 Min Read September 26, 2025 Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to…
Data Breach Malware4 Min Read September 26, 2025 New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed…
CISO Press Release Report Research4 Min Read September 25, 2025 Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk Austin / TX, United States, September 25th, 2025, CyberNewsWire Living Security, a global leader in Human Risk Management (HRM), today…
Botnets Malware Phishing Windows2 Min Read September 25, 2025 Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment…
Phishing Ransomware Windows4 Min Read September 25, 2025 The Threat of Privilege Abuse in Active Directory In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare sector. It later…
Anti-Malware Research6 Min Read September 25, 2025 The Scam That Won’t Quit: Malicious “TradingView Premium” Ads Jump from Meta to Google and YouTube Over the past year, Bitdefender researchers have been monitoring a persistent malicious campaign that initially spread via Facebook Ads,…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Malware Ransomware Vulnerabilities Windows3 Min Read September 25, 2025 Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms Chinese cyber threat actors are suspected of deploying a recently identified backdoor to get a foothold into the systems of US organizations…
Exploits Linux Vulnerabilities2 Min Read September 25, 2025 US Federal Agency Breached Via GeoServer Vulnerability IntroductionIn September 2025, CISA confirmed that a major breach had impacted a US federal agency through the exploitation of a critical…
Linux Social Engineering Vulnerabilities Windows2 Min Read September 25, 2025 CVE-2025-41715 (CVSS 9.8): Unauthenticated Flaw Exposes WAGO Industrial Databases VDE CERT has issued a security advisory disclosing two vulnerabilities in WAGO Device Sphere and WAGO Solution Builder, software widely used…
Apple DDoS Network Vulnerabilities3 Min Read September 24, 2025 Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE software, confirming it is being actively…