Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Artificial Intelligence Online Security4 Min Read November 26, 2025 FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Threat Intelligence Vulnerability4 Min Read November 14, 2025 Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb Web Application Firewall…
Patch Tuesday Vulnerability3 Min Read November 12, 2025 Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active…
Cybersecurity Hacking News11 Min Read November 6, 2025 ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized…
Data Breach Phishing Ransomware Vulnerabilities2 Min Read October 20, 2025 Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More It's easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Server Security Vulnerability1 Min Read October 15, 2025 Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations,…
Cloud Security DDoS Vulnerabilities Windows3 Min Read October 14, 2025 Patch Tuesday October 2025: Three Zero-days Under Attack Microsoft’s Patch Tuesday October 2025 included fixes for 175 vulnerabilities, including three exploited zero-days and 13 additional…
Exploits Network Supply Chain Vulnerabilities2 Min Read October 14, 2025 FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process Fortinet has issued an urgent advisory revealing a critical weakness in its FortiPAM and FortiSwitch Manager products that could allow…
Exploits Network Vulnerabilities1 Min Read October 14, 2025 FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October 14, 2025, that could enable local authenticated…
Apple Malware Ransomware Windows2 Min Read October 13, 2025 New Stealit Malware Campaign Spreads via VPN and Game Installer Apps Threat actors are conducting a new malicious campaign deploying the Stealit malware via disguised applications, according to Fortinet. The…
Botnet Network Security2 Min Read October 13, 2025 Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30…
Ransomware Windows Security2 Min Read October 13, 2025 New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct…
Data Theft Ransomware2 Min Read October 10, 2025 Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices…
Security4 Min Read October 8, 2025 New FileFix attack uses cache smuggling to evade security software A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
Data Security Malware4 Min Read October 8, 2025 Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Cyber Espionage Malware2 Min Read October 2, 2025 Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like…
Incident Response Malware2 Min Read October 1, 2025 Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called…
Malware Phishing Vulnerabilities Windows3 Min Read September 29, 2025 China-linked RedNovember Campaign Shows Importance of Patching Edge Devices A long-running threat campaign linked to a Chinese state-sponsored cyber-espionage group highlights the importance of patching and protecting…
Malware Ransomware Vulnerabilities Windows3 Min Read September 29, 2025 RedNovember: Chinese APT Expands Global Espionage to U.S. Defense, Aerospace, and Tech Firms A new report from Recorded Future’s Insikt Group reveals that the Chinese state-sponsored threat group RedNovember has significantly…
Malware Ransomware Vulnerabilities Windows5 Min Read September 27, 2025 Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June…
Cryptocurrency Malware2 Min Read September 26, 2025 Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to…
Threat Intelligence Vulnerability2 Min Read September 26, 2025 Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure Cybersecurity company watchTowr Labs has disclosed that it has "credible evidence" of active exploitation of the recently disclosed security…
Network Security Vulnerability3 Min Read September 24, 2025 Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Data Breach Network Ransomware Vulnerabilities2 Min Read September 19, 2025 Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cybersecurity researchers have identified a potential connection between two Yemen-based cybercriminal organizations, the Belsen Group and…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
Network Vulnerabilities2 Min Read September 9, 2025 FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands Fortinet has disclosed a medium-severity vulnerability in its FortiDDoS-F product line that could allow a privileged attacker to execute…
Artificial Intelligence Malware Phishing4 Min Read September 9, 2025 From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan…
Malware Network Phishing Ransomware Vulnerabilities Windows4 Min Read August 29, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in…
Security2 Min Read August 27, 2025 Nissan confirms design studio data breach claimed by Qilin ransomware Nissan Japan has confirmed to BleepingComputer that it suffered a data breach following unauthorized access to a server of one of its…
Malware Network Phishing2 Min Read August 27, 2025 Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools A global phishing campaign using personalized emails and fake websites to deliver malicious downloads has been identified by cybersecurity…
Cloud Security Malware4 Min Read August 26, 2025 Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware…