Email Security Threat Intelligence2 Min Read December 17, 2025 APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a "sustained" credential-harvesting…
Endpoint Security Threat Intelligence5 Min Read December 17, 2025 Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time Modern security teams often feel like they're driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs…
Cloud Security Exploits Ransomware Vulnerabilities9 Min Read December 17, 2025 Introducing Pathfinding.cloud Today we’re releasing pathfinding.cloud, an extensive knowledge base that documents the IAM permissions and permission sets that allow…
Cloud Security Vulnerability3 Min Read December 16, 2025 Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Email Security Malware6 Min Read December 12, 2025 New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Automation Compliance4 Min Read December 11, 2025 The Impact of Robotic Process Automation (RPA) on Identity and Access Management As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool…
Malware Vulnerability3 Min Read December 10, 2025 Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
Malware Vulnerability4 Min Read December 9, 2025 North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in…
Cybersecurity Password Security3 Min Read December 8, 2025 How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns…
Patch Management Vulnerability3 Min Read December 6, 2025 Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server…
Mobile Security Zero Day5 Min Read December 5, 2025 Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery A human rights lawyer from Pakistan's Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first…
Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Malware Mobile Security4 Min Read December 1, 2025 New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a "full spectrum" of features to…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Malware Supply Chain4 Min Read November 26, 2025 Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the…
Cloud Security Vulnerability3 Min Read November 24, 2025 Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Cloud Security Cyber Espionage3 Min Read November 22, 2025 China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information…
Malware Mobile Security3 Min Read November 20, 2025 New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device…
Cyber Attack Malware4 Min Read November 19, 2025 Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking…
Cyber Espionage Malware3 Min Read November 18, 2025 Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued…
Enterprise Security Zero Trust8 Min Read November 18, 2025 Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF,…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cloud Security Social Engineering6 Min Read November 17, 2025 5 Reasons Why Attackers Are Phishing Over LinkedIn Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
AI Security Cyber Espionage3 Min Read November 14, 2025 Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber…
Online Fraud Payment Security4 Min Read November 13, 2025 Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year.…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Password Security Threat Detection4 Min Read November 12, 2025 Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD's importance has grown as companies adopt…
Cyber Espionage Malware5 Min Read November 7, 2025 From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term…
Cloud Security Data Protection4 Min Read November 7, 2025 Enterprise Credentials at Risk – Same Old, Same Old? Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…
Malware Vulnerability3 Min Read November 6, 2025 Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks…
Cybersecurity Hacking News11 Min Read November 6, 2025 ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized…
Malware Network Security2 Min Read November 6, 2025 Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and…
Cloud Security Incident Response2 Min Read November 6, 2025 SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure…
Cyber Espionage Cybersecurity3 Min Read November 5, 2025 Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting…
Cybercrime Supply Chain Attack2 Min Read November 3, 2025 Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…