Amatera Stealer Crypto Cryptojacking Cybersecurity Malware Phishing Phishing Scam Police PureMiner Security SVG Ukraine2 Min Read September 26, 2025 Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner Hackers are distributing malicious emails that imitate official notices from the National Police of Ukraine. This phishing campaign,…
Microsoft3 Min Read September 26, 2025 Microsoft releases the final Windows 10 22H2 preview update Microsoft has released the final non-security preview update for Windows 10, version 22H2, which includes fixes for the out-of-box experience…
Browser Security Malware2 Min Read September 26, 2025 New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in limited…
DDoS Malware Vulnerabilities Windows2 Min Read September 26, 2025 Rack Security Update: High-Severity Flaw Bypasses Parameter Limit, Exposing Apps to DoS Attacks The Rack project, a key Ruby library providing a minimal and modular interface for web application development, has released a update…
Data Breach Malware Ransomware Windows3 Min Read September 26, 2025 New LockBit Ransomware Variant Emerges as Most Dangerous Yet Trend Micro has identified a new LockBit ransomware variant that is “significantly more dangerous” than previous versions and is being…
Apple Security2 Min Read September 25, 2025 Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs Microsoft Threat Intelligence reports that a new variant of the XCSSET macOS malware has been detected in limited attacks, incorporating…
Security2 Min Read September 25, 2025 CISA orders agencies to patch Cisco flaws exploited in zero-day attacks CISA has issued a new emergency directive ordering U.S. federal agencies to secure their Cisco firewall devices against two flaws that have…
Cofense Copyright Cryptocurrency Cyber Attack Cybersecurity Infostealer Lone None Lone None Stealer Malware Pure Logs Stealer Scam Security Telegram Vietnam2 Min Read September 25, 2025 Vietnamese Hackers Use Fake Copyright Notices to Spread Lone None Stealer A Vietnamese hacking group known as Lone None is running an online scam campaign that has been active since at least November 2024. The…
Cryptocurrency Malware5 Min Read September 25, 2025 North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented…
Anti-Malware Research6 Min Read September 25, 2025 The Scam That Won’t Quit: Malicious “TradingView Premium” Ads Jump from Meta to Google and YouTube Over the past year, Bitdefender researchers have been monitoring a persistent malicious campaign that initially spread via Facebook Ads,…
Microsoft2 Min Read September 25, 2025 Microsoft will offer free Windows 10 security updates in Europe Microsoft will offer free extended security updates for Windows 10 users in the European Economic Area (EEA), which includes Iceland,…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Malware Ransomware Vulnerabilities Windows3 Min Read September 25, 2025 Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms Chinese cyber threat actors are suspected of deploying a recently identified backdoor to get a foothold into the systems of US organizations…
BRICKSTORM China Cyber Attack Cybersecurity Google Linux Malware Mandiant SaaS Security UNC5221 Vulnerability3 Min Read September 25, 2025 China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity researchers at…
Linux Social Engineering Vulnerabilities Windows2 Min Read September 25, 2025 CVE-2025-41715 (CVSS 9.8): Unauthenticated Flaw Exposes WAGO Industrial Databases VDE CERT has issued a security advisory disclosing two vulnerabilities in WAGO Device Sphere and WAGO Solution Builder, software widely used…
Network Security Vulnerability3 Min Read September 24, 2025 Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning…
Linux Malware Vulnerabilities Windows5 Min Read September 24, 2025 Google warns China-linked spies lurking in 'numerous' enterprises since March Unknown intruders – likely China-linked spies – have broken into "numerous" enterprise networks since March and deployed…
Security2 Min Read September 24, 2025 Google: Brickstone malware used to steal U.S. orgs' data for over a year Suspected Chinese hackers have used the Brickstorm malware in long-term persistence espionage operations against U.S. organizations in the…
Vulnerabilities Web Security Windows2 Min Read September 24, 2025 CVE-2025-59545: Critical XSS Flaw in DNN Software Puts 750,000 Websites at Risk DNN Software has issued a security advisory warning of a critical stored cross-site scripting (XSS) vulnerability in its Prompt module,…
Malware Ransomware Vulnerabilities Windows3 Min Read September 23, 2025 22 Vulnerabilities Under Attack – And Another That Could Be Cyble researchers detailed 22 vulnerabilities under active attack in a blog post today – and nine of them aren’t in CISA’s…
Cloud Security Malware Phishing Windows2 Min Read September 23, 2025 Iranian Hacking Group Nimbus Manticore Expands European Targeting A long-running cyber-espionage campaign tied to Iran has intensified its operations in Europe. The group, known as Nimbus Manticore, has a…
Phishing Ransomware Social Engineering Windows3 Min Read September 23, 2025 Deepfake Attacks Hit Two-Thirds of Businesses Nearly two-thirds (62%) of organizations have experienced a deepfake attack in the past 12 months, according to a new Gartner survey. These…
Malware Supply Chain Attack3 Min Read September 23, 2025 GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent…
Vulnerabilities Web Security Windows2 Min Read September 23, 2025 CVE-2025-9125: Cross-Site Scripting Flaw in Lectora Courses Puts E-Learning Platforms at Risk The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of a cross-site scripting (XSS) flaw affecting Lectora, a…
Botnets Malware Supply Chain Windows2 Min Read September 23, 2025 BlockBlasters: When a Steam Game Turns Into a Malware Delivery Vehicle What began as a promising indie platformer has turned into one of the most alarming cases of malware-laced games on Steam in 2025. According…
Malware Phishing Vulnerabilities Windows2 Min Read September 23, 2025 Beyond Trust: A New Campaign Is Using a Legitimate Tool to Deliver RATs A new report from Hunt Intelligence reveals how attackers are abusing ConnectWise ScreenConnect (formerly ConnectWise Control) to deliver…
Security2 Min Read September 22, 2025 New EDR-Freeze tool uses Windows WER to suspend security software A new method and proof-of-concept tool called EDR-Freeze demonstrates that evading security solutions is possible from user mode with…
Microsoft2 Min Read September 22, 2025 Microsoft lifts Windows 11 update block after face detection fix Microsoft has removed a compatibility hold that prevented devices with integrated cameras from installing Windows 11 24H2 due to a face…
Data Theft Malware3 Min Read September 22, 2025 ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented…
Microsoft2 Min Read September 22, 2025 Microsoft says recent updates cause DRM video playback issues Microsoft has confirmed a known issue that prevents some apps from playing Digital Rights Management (DRM) protected video content or…
Malware Network Ransomware Windows6 Min Read September 22, 2025 Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE’s annual endpoint detection and…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Cloud Security Exploits Vulnerabilities Windows3 Min Read September 22, 2025 Microsoft Entra ID Exposed: Actor Token Flaw Enables Stealthy Global Admin Takeove A newly disclosed vulnerability tracked as CVE-2025-55241 has been reported. The flaw, discovered by an independent researcher and disclosed…
Cloud Security Vulnerability5 Min Read September 22, 2025 Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any…
Security4 Min Read September 21, 2025 Microsoft Entra ID flaw allowed hijacking any company's tenant A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
DDoS Malware Ransomware Vulnerabilities7 Min Read September 20, 2025 Top Zero-Day Vulnerabilities Exploited in the Wild in 2025 The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.…
Artificial Intelligence Malware3 Min Read September 20, 2025 Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Cybersecurity researchers have discovered what they say is the earliest example known to date of a malware with that bakes in Large Language…
Artificial Intelligence Cloud Security3 Min Read September 20, 2025 ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent Cybersecurity researchers have disclosed a zero-click flaw in OpenAI ChatGPT's Deep Research agent that could allow an attacker to leak…
Malware Ransomware Vulnerabilities Windows14 Min Read September 20, 2025 WannaCry Ransomware: A DFIR & SOC Monitoring Lab Walkthrough Hello fellow defenders, I hope you are having a great day. In this article, I’m going to show you how you can make a cybersecurity home…