Artificial Intelligence Economic Espionage3 Min Read January 30, 2026 Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted…
Anti-Malware Research5 Min Read January 29, 2026 Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload Delivery Bitdefender researchers have discovered an Android RAT (remote access trojan) campaign that combines social engineering, the resources of the…
Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
Malware Threat Intelligence6 Min Read January 29, 2026 Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest…
AI Security Malware4 Min Read January 28, 2026 Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Cyber Espionage Endpoint Security3 Min Read January 28, 2026 Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in…
Threat Intelligence Vulnerability3 Min Read January 28, 2026 Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a…
Data Breach Phishing Ransomware Windows14 Min Read January 7, 2026 Decoding the GitHub recommendations for npm maintainers The open source package distribution ecosystem in general has seen an increase in both velocity and severity of targeted attacks (both…
Data Breach Software Security3 Min Read December 31, 2025 Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was…
Ad Fraud Malware3 Min Read December 31, 2025 DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…
Cybersecurity Hacking News17 Min Read December 29, 2025 ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More Last week's cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust…
Artificial Intelligence Cloud Security7 Min Read December 29, 2025 Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for…
Cryptocurrency Incident Response2 Min Read December 26, 2025 Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a "security incident"…
Cybersecurity Hacking News12 Min Read December 25, 2025 ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories It's getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they're…
Endpoint Security Malware2 Min Read December 24, 2025 New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means of a digitally…
Browser Security Enterprise Security3 Min Read December 23, 2025 Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that…
Enterprise Software Password Security5 Min Read December 23, 2025 Passwd: A walkthrough of the Google Workspace Password Manager Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password…
Financial Crime Law Enforcement2 Min Read December 23, 2025 U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal…
Malware Open Source3 Min Read December 22, 2025 Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional WhatsApp…
Cybersecurity Hacking News17 Min Read December 22, 2025 ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust…
ATM Security Cybercrime3 Min Read December 20, 2025 U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a multi-million dollar ATM…
Endpoint Security Threat Intelligence4 Min Read December 19, 2025 Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector…
Cybercrime Law Enforcement2 Min Read December 19, 2025 Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks Authorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects" who are alleged to have been involved in…
Cloud Security Malware3 Min Read December 18, 2025 China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting…
Cybersecurity Hacking News11 Min Read December 18, 2025 ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in…
Malware Mobile Security4 Min Read December 18, 2025 Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called…
Network Security Vulnerability1 Min Read December 17, 2025 SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been actively…
Botnet Internet of Things4 Min Read December 17, 2025 Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks A new distributed denial-of-service (DDoS) botnet known as Kimwolf has enlisted a massive army of no less than 1.8 million infected devices…
Malware Vulnerability3 Min Read December 17, 2025 New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia,…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Browser Security SaaS Security6 Min Read December 15, 2025 A Browser Extension Risk Guide After the ShadyPanda Campaign In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser…
Vulnerability Zero-Day2 Min Read December 13, 2025 Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security…
Cryptocurrency Malware4 Min Read December 12, 2025 Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a…
Email Security Malware6 Min Read December 12, 2025 New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Cyber Espionage Windows Security2 Min Read December 11, 2025 NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for…
Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
December 10, 2025 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users Datadog has identified an active phishing campaign that targets organizations that use Microsoft 365 and Okta for their single sign-on (SSO)…
Artificial Intelligence Browser Security4 Min Read December 9, 2025 Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI)…
Cybersecurity Hacking News14 Min Read December 8, 2025 ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake…
Malware Mobile Security4 Min Read December 8, 2025 Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded…