Enterprise Security SaaS Security5 Min Read December 18, 2025 The Case for Dynamic AI-SaaS Security as Copilots Scale Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools…
Malware Vulnerability3 Min Read December 17, 2025 New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia,…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Browser Security SaaS Security6 Min Read December 15, 2025 A Browser Extension Risk Guide After the ShadyPanda Campaign In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser…
Vulnerability Zero-Day2 Min Read December 13, 2025 Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security…
Email Security Malware6 Min Read December 12, 2025 New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Cyber Espionage Windows Security2 Min Read December 11, 2025 NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for…
Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Enterprise Security Web Services2 Min Read December 10, 2025 .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to…
Malware Vulnerability3 Min Read December 10, 2025 Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
Malware Vulnerability4 Min Read December 9, 2025 North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in…
Endpoint Security Ransomware2 Min Read December 9, 2025 Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced…
Cybersecurity Hacking News14 Min Read December 8, 2025 ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake…
Email Security Threat Research3 Min Read December 5, 2025 Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails A new agentic browser attack targeting Perplexity's Comet browser that's capable of turning a seemingly innocuous email into a destructive…
Network Security Zero-Day5 Min Read December 5, 2025 CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put…
Cybercrime Endpoint Security3 Min Read December 4, 2025 Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat group in attacks…
Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Blockchain Malware2 Min Read December 2, 2025 GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Email Security Enterprise Security3 Min Read November 28, 2025 MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365…
Malware Social Engineering2 Min Read November 27, 2025 Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since at least June 2025…
Web Security Zero Trust3 Min Read November 27, 2025 Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Malware Supply Chain4 Min Read November 26, 2025 Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the…
Data Breach Ransomware4 Min Read November 26, 2025 Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist South Korea's financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment…
Malvertising Windows Security4 Min Read November 25, 2025 JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers Cybersecurity researchers are calling attention to a new campaign that's leveraging a combination of ClickFix lures and fake adult websites to…
Malware Vulnerability3 Min Read November 25, 2025 ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Cloud Security Cyber Espionage3 Min Read November 22, 2025 China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information…
Browser Security Cybercrime3 Min Read November 22, 2025 Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new…
Data Protection Mobile Security3 Min Read November 21, 2025 Why IT Admins Choose Samsung for Mobile Security Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for…
Malware Threat Intelligence5 Min Read November 21, 2025 APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…
Cybersecurity Hacking News11 Min Read November 20, 2025 ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work,…
Malware Social Engineering2 Min Read November 18, 2025 Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a…
Cyber Espionage Malware3 Min Read November 18, 2025 Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cloud Security Social Engineering6 Min Read November 17, 2025 5 Reasons Why Attackers Are Phishing Over LinkedIn Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social…
Artificial Intelligence Vulnerability3 Min Read November 14, 2025 Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
Online Fraud Payment Security4 Min Read November 13, 2025 Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year.…