Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Data Privacy Web Security6 Min Read December 4, 2025 5 Threats That Reshaped Web Security This Year [2025] As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become dangerously…
Cybercrime Mobile Security4 Min Read December 4, 2025 GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks…
Identity theft Threat Intelligence3 Min Read December 2, 2025 Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a…
Blockchain Malware2 Min Read December 2, 2025 GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Malware Mobile Security4 Min Read December 1, 2025 New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a "full spectrum" of features to…
Hacktivism Vulnerability3 Min Read November 30, 2025 CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a…
Malware Supply Chain Attack2 Min Read November 28, 2025 North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Cloud Security Ransomware3 Min Read November 27, 2025 Gainsight Expands Impacted Customer List Following Salesforce Security Alert Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.…
Malware Supply Chain4 Min Read November 26, 2025 Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the…
Cyber Espionage Malware2 Min Read November 26, 2025 RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed…
Malvertising Windows Security4 Min Read November 25, 2025 JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers Cybersecurity researchers are calling attention to a new campaign that's leveraging a combination of ClickFix lures and fake adult websites to…
Malware Vulnerability3 Min Read November 25, 2025 ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Cloud Security Cyber Espionage3 Min Read November 22, 2025 China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information…
Data Protection Technology3 Min Read November 21, 2025 Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple's…
Malware Threat Intelligence5 Min Read November 21, 2025 APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…
Data Breach SaaS Security2 Min Read November 21, 2025 Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity Salesforce has warned of detected "unusual activity" related to Gainsight-published applications connected to the platform. "Our investigation…
Cybersecurity Hacking News11 Min Read November 20, 2025 ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work,…
Malware Mobile Security3 Min Read November 20, 2025 New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device…
Cyber Attack Malware4 Min Read November 19, 2025 Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking…
Cyber Espionage Malware3 Min Read November 18, 2025 Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued…
Malware Web Security2 Min Read November 18, 2025 Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cloud Security Social Engineering6 Min Read November 17, 2025 5 Reasons Why Attackers Are Phishing Over LinkedIn Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
AI Security Cyber Espionage3 Min Read November 14, 2025 Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Network Security Vulnerability2 Min Read November 13, 2025 CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to…
Cybercrime Malware3 Min Read November 12, 2025 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are…
Patch Tuesday Vulnerability3 Min Read November 12, 2025 Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active…
Malware Network Security3 Min Read November 11, 2025 GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from…
AI Security Regulatory Compliance6 Min Read November 11, 2025 CISO's Expert Guide To AI Supply Chain Attacks AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Data Protection Network Security4 Min Read November 8, 2025 Microsoft Uncovers 'Whisper Leak' Attack That Identifies AI Chat Topics in Encrypted Traffic Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with…
Data Protection Malware3 Min Read November 7, 2025 Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by…
Cloud Security Incident Response2 Min Read November 6, 2025 SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure…
Enterprise IT Mobile Security3 Min Read November 5, 2025 Securing the Open Android Ecosystem with Samsung Knox Raise your hand if you've heard the myth, "Android isn't secure." Android phones, such as the Samsung Galaxy, unlock new ways of working. But,…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Malware Mobile Security3 Min Read November 3, 2025 Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting…