Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
AI Security Malware4 Min Read January 28, 2026 Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Cyber Espionage Endpoint Security3 Min Read January 28, 2026 Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in…
Linux Ransomware Vulnerabilities Windows7 Min Read January 26, 2026 Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE In recent years, Integrated Development Environments (IDEs) have become a pivotal component in modern software development, providing…
Ad Fraud Malware3 Min Read December 31, 2025 DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…
Email Security Vulnerability2 Min Read December 30, 2025 CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail…
Malware Phishing3 Min Read December 30, 2025 Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a…
Cyber Espionage Malware4 Min Read December 30, 2025 Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant…
Cybersecurity Hacking News17 Min Read December 29, 2025 ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More Last week's cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust…
Cloud Security Threat Intelligence3 Min Read December 29, 2025 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…
Endpoint Security Threat Intelligence,4 Min Read December 26, 2025 China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary…
Cybersecurity Hacking News12 Min Read December 25, 2025 ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories It's getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they're…
Browser Security Enterprise Security3 Min Read December 23, 2025 Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that…
Cybersecurity Hacking News17 Min Read December 22, 2025 ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust…
Cyber Espionage Malware3 Min Read December 21, 2025 Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years…
Cloud Security Cybersecurity2 Min Read December 19, 2025 Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal…
Endpoint Security Threat Intelligence4 Min Read December 19, 2025 Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector…
Cybercrime Law Enforcement2 Min Read December 19, 2025 Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks Authorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects" who are alleged to have been involved in…
Cloud Security Malware3 Min Read December 18, 2025 China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting…
Cybersecurity Hacking News11 Min Read December 18, 2025 ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in…
Enterprise Security SaaS Security5 Min Read December 18, 2025 The Case for Dynamic AI-SaaS Security as Copilots Scale Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools…
Malware Vulnerability3 Min Read December 17, 2025 New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia,…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Browser Security SaaS Security6 Min Read December 15, 2025 A Browser Extension Risk Guide After the ShadyPanda Campaign In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser…
Vulnerability Zero-Day2 Min Read December 13, 2025 Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security…
Email Security Malware6 Min Read December 12, 2025 New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Cyber Espionage Windows Security2 Min Read December 11, 2025 NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for…
Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Enterprise Security Web Services2 Min Read December 10, 2025 .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to…
Anti-Malware Research6 Min Read December 10, 2025 Fake Leonardo DiCaprio Movie Torrent Drops Agent Tesla Through Layered PowerShell Chain After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started…
Malware Vulnerability3 Min Read December 10, 2025 Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
December 10, 2025 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users Datadog has identified an active phishing campaign that targets organizations that use Microsoft 365 and Okta for their single sign-on (SSO)…
Malware Vulnerability4 Min Read December 9, 2025 North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in…
Endpoint Security Ransomware2 Min Read December 9, 2025 Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced…
Cybersecurity Hacking News14 Min Read December 8, 2025 ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake…
Email Security Threat Research3 Min Read December 5, 2025 Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails A new agentic browser attack targeting Perplexity's Comet browser that's capable of turning a seemingly innocuous email into a destructive…
Network Security Zero-Day5 Min Read December 5, 2025 CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put…
Cybercrime Endpoint Security3 Min Read December 4, 2025 Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat group in attacks…
Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Blockchain Malware2 Min Read December 2, 2025 GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open…