Cybersecurity Hacking13 Min Read March 16, 2026 ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now”…
Cyber Espionage Military Security3 Min Read March 13, 2026 Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign…
Enterprise Security Vulnerability2 Min Read March 11, 2026 Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on…
Browser Security Threat Intelligence5 Min Read March 9, 2026 Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push…
Cloud Security Social Engineering3 Min Read February 25, 2026 SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women…
Cyber Attack Vulnerability2 Min Read February 20, 2026 BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and…
Cybersecurity Hacking News15 Min Read February 19, 2026 ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up…
Network Security Threat Detection9 Min Read February 17, 2026 My Day Getting My Hands Dirty with an NDR System My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could…
Data Breach Phishing Ransomware Vulnerabilities13 Min Read February 16, 2026 Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons,…
Endpoint Security Malware5 Min Read February 10, 2026 Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring…
Cyber Espionage Malware3 Min Read February 6, 2026 Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical…
Cybersecurity Hacking News11 Min Read February 5, 2026 ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look…
Cybersecurity Hacking News17 Min Read December 29, 2025 ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More Last week's cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust…
Cybersecurity Hacking News17 Min Read December 22, 2025 ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust…
Cyber Espionage Malware3 Min Read December 21, 2025 Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years…
Cybersecurity Hacking News11 Min Read December 18, 2025 ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in…
Network Security Vulnerability3 Min Read December 18, 2025 Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Network Security Vulnerability2 Min Read December 13, 2025 CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Cyber Espionage Windows Security2 Min Read December 11, 2025 NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for…
Cyberwarfare Threat Intelligence3 Min Read December 11, 2025 WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the…
Botnet Vulnerability4 Min Read December 10, 2025 React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server…
Cloud Security Threat Detection2 Min Read December 10, 2025 Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations,…
Patch Management Vulnerability3 Min Read December 6, 2025 Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Malware Mobile Security4 Min Read December 1, 2025 New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a "full spectrum" of features to…
Cloud Security Ransomware3 Min Read November 27, 2025 Gainsight Expands Impacted Customer List Following Salesforce Security Alert Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Malware Threat Intelligence2 Min Read November 14, 2025 North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services…
Cybercrime Malware3 Min Read November 12, 2025 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are…
Patch Tuesday Vulnerability3 Min Read November 12, 2025 Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Mobile Security Vulnerability4 Min Read November 7, 2025 Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a "commercial-grade" Android spyware…
Browser Security Malware3 Min Read October 31, 2025 Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain…
Threat Intelligence Vulnerability3 Min Read October 31, 2025 CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from…
Cybercrime Malware2 Min Read October 30, 2025 Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
Cybercrime Data Breach3 Min Read October 24, 2025 Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1,…
Cloud Security Financial Crime2 Min Read October 23, 2025 “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments…
Blockchain Malware2 Min Read October 16, 2025 North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique…