Malware Threat Intelligence2 Min Read October 7, 2025 BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job…
Google Security2 Min Read October 7, 2025 Google's new AI bug bounty program pays up to $30,000 for flaws This week, Google has launched an AI Vulnerability Reward Program dedicated to security researchers who find and report flaws in the company's…
Data Breach Malware Phishing Ransomware9 Min Read October 7, 2025 Security in AI Era: Protecting AI Workloads with Google Cloud Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, along with…
Exploits Network Vulnerabilities2 Min Read October 7, 2025 Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass – PoC Released Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…
Cybersecurity Mic-E-Mouse Security Vulnerability2 Min Read October 7, 2025 New Mic-E-Mouse Attack Shows Computer Mice Can Capture Conversations A team of researchers from the University of California, Irvine, has discovered a security risk right on your desk. It turns out that your…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 NCSC: Patch Critical Oracle EBS Bug Now Oracle E-Business Suite (EBS) customers have been urged to patch a critical vulnerability in the product, after reports that the…
Android Malware ProSpy Scam Security Signal Social Engineering Spyware ToSpy ToTok UAE2 Min Read October 6, 2025 Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users If you use messaging apps in the United Arab Emirates (UAE), cybersecurity researchers at ESET have identified two mobile spyware campaigns…
Data Breach DDoS Phishing Ransomware3 Min Read October 6, 2025 Ransomware Group “Trinity of Chaos” Launches Data Leak Site A new data leak site hosted on the TOR network has been launched by the “Trinity of Chaos” – a ransomware collective…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Artificial Intelligence Data Protection4 Min Read October 6, 2025 5 Critical Questions For Adopting an AI Security Solution In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security…
Threat Intelligence Vulnerability2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Apple Linux Vulnerabilities Windows2 Min Read October 5, 2025 Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used…
Data Breach Network Ransomware Vulnerabilities5 Min Read October 5, 2025 Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users Cybereason is continuing to investigate. Check the Cybereason blog for additional updates. Overview and What Cybereason Knows So Far…
Cyber Attack Cyber Crime Cybersecurity Extortion Ransom Security3 Min Read October 3, 2025 Scattered LAPSUS$ Hunters Claim Salesforce Breach, 1B Records, 39 Firms Listed A new leak site has gone live, operated by the notorious group calling itself “Scattered Lapsus$ Hunters,” (a coalition that…
Security3 Min Read October 3, 2025 ShinyHunters launches Salesforce data leak site to extort 39 victims An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches,…
Artificial Intelligence Security Software3 Min Read October 3, 2025 CommetJacking attack tricks Comet browser into stealing emails A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions that allow…
Cloud Security Phishing Vulnerabilities4 Min Read October 3, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 40 The Good | UK Convicts “Bitcoin Queen” in World’s Largest Cryptocurrency Seizure This week, a court in the UK convicted…
Cl0p Cyber Attack Cyber Attacks Cyber Crime Cybersecurity FIN11 Google Mandiant Ransomware Security2 Min Read October 3, 2025 Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers Cybersecurity experts are on high alert as a group claiming ties to the infamous Cl0p ransomware gang is bombarding companies with emails that…
Security2 Min Read October 3, 2025 Oracle links Clop extortion attacks to July 2025 vulnerabilities Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were…
Exploits Vulnerabilities2 Min Read October 3, 2025 Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated…
Exploits Network Vulnerabilities2 Min Read October 3, 2025 DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely A critical vulnerability has been discovered in DrayTek’s DrayOS routers, which could allow unauthenticated remote attackers to execute…
Google Security2 Min Read October 3, 2025 Gmail business users can now send encrypted emails to anyone Google says that Gmail enterprise users can now send end-to-end encrypted emails to people who use any email service or platform. To send an…
Cloud Security Data Breach Ransomware Vulnerabilities2 Min Read October 3, 2025 Hackers Target Unpatched Flaws in Oracle E-Business Suite Oracle has advised customers that hackers may be exploiting vulnerabilities in unpatched instances of its E-Business Suite (EBS). This follows…
Cloud Security Data Breach Ransomware Vulnerabilities2 Min Read October 3, 2025 Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Red Hat, the world’s leading enterprise open-source software provider, has officially confirmed a significant security incident…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 3, 2025 Google Announces $4 Billion Arkansas Investment for New AI Data Center and 600 MW Solar Project Google has announced plans to invest up to $4 billion in Arkansas by 2027, channeling resources into infrastructure, energy transition, and…
Cloud Security Data Breach Ransomware1 Min Read October 2, 2025 Extortion Emails Sent to Executives by Self-Proclaimed Clop Gang Member An individual or group of people claiming to be working with the Clop ransomware has been sending extortion emails to executives at several…
Cyber Espionage Malware2 Min Read October 2, 2025 Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like…
AI Artificial Intelligence Cybersecurity Gemini AI Gemini Trifecta Google Security Vulnerability2 Min Read October 2, 2025 Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Ransomware Threat Intelligence2 Min Read October 2, 2025 Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to…
Security3 Min Read October 2, 2025 Android spyware campaigns impersonate Signal and ToTok messengers Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok…
Malware Mobile Security4 Min Read October 2, 2025 Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…
Linux Vulnerabilities Windows2 Min Read October 2, 2025 Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser Google has released Chrome 141 to address 21 security vulnerabilities, including critical flaws that could allow attackers to crash browsers…
DDoS Phishing Vulnerabilities Web Security3 Min Read October 2, 2025 Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers to…
Security3 Min Read October 2, 2025 Clop extortion emails claim theft of Oracle E-Business Suite data Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data…
Mobile Security3 Min Read October 1, 2025 Android malware uses VNC to give attackers hands-on access A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000…
Google Mobile Security3 Min Read October 1, 2025 F-Droid project threatened by Google's new dev registration rules F-Droid is warning that the project could reach an end due to Google’s new requirements for all Android developers to verify their…
Artificial Intelligence Google Security2 Min Read October 1, 2025 Google Drive for desktop gets AI-powered ransomware detection Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it…
Apple Botnets Network Vulnerabilities2 Min Read October 1, 2025 CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports…
Exploits Linux Vulnerabilities2 Min Read October 1, 2025 Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…