Blockchain Malware2 Min Read October 16, 2025 North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique…
Cybersecurity Hacking News15 Min Read October 16, 2025 ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it's become to turn everyday technology into a…
Cyber Espionage Threat Intelligence3 Min Read October 15, 2025 Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Data Security Malware4 Min Read October 8, 2025 Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
Security3 Min Read October 8, 2025 Salesforce refuses to pay ransom over widespread data theft attacks Salesforce has confirmed that it will not negotiate with or pay a ransom to the threat actors behind a massive wave of data theft attacks that…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Security2 Min Read October 4, 2025 Massive surge in scans targeting Palo Alto Networks login portals A spike in suspicious scans targeting Palo Alto Networks login portals indicates clear reconnaissance efforts from suspicious IP addresses,…
Network Security Vulnerability1 Min Read October 4, 2025 Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login…
Security3 Min Read October 3, 2025 ShinyHunters launches Salesforce data leak site to extort 39 victims An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches,…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
DDoS Malware Network Vulnerabilities2 Min Read October 2, 2025 Critical Flaw CVE-2025-52906 (CVSS 9.3) Allows Unauthenticated RCE on TOTOLINK X6000R Routers Researchers from Unit 42, Palo Alto Networks’ threat intelligence team, have disclosed three newly discovered in the firmware of the…
APT Groups Malware Network Windows3 Min Read October 1, 2025 New China-Aligned Hackers Hit State and Telecom Sectors A newly identified cyber espionage group has been targeting government and telecommunications organizations across Africa, the Middle East and…
Afghanistan China Cyber Attack Cyber Attacks Cybersecurity IIServerCore Malware Mustang Panda NET-STAR Pakistan Phantom Taurus Security Winnti2 Min Read September 30, 2025 Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years Researchers at Palo Alto Networks say a Chinese-linked cyberespionage group has been targeting foreign ministries, embassies, and…
Cyber Espionage Malware3 Min Read September 30, 2025 Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously…
Exploits Network Ransomware Vulnerabilities2 Min Read September 30, 2025 Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Security researchers are observing a significant increase in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability…
Malware Phishing Vulnerabilities Windows3 Min Read September 29, 2025 China-linked RedNovember Campaign Shows Importance of Patching Edge Devices A long-running threat campaign linked to a Chinese state-sponsored cyber-espionage group highlights the importance of patching and protecting…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…
Malware Ransomware Vulnerabilities Windows5 Min Read September 27, 2025 Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Network Security Vulnerability3 Min Read September 24, 2025 Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning…
Cloud Security DDoS Malware Ransomware2 Min Read September 24, 2025 ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms A new campaign that combines traditional malware with modern DevOps tooling has been observed by cybersecurity analysts. The ShadowV2 DDoS…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Malware SEO Poisoning3 Min Read September 23, 2025 BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a…
Security2 Min Read September 22, 2025 Automaker giant Stellantis confirms data breach after Salesforce hack Automotive manufacturing giant Stellantis has confirmed that attackers stole some of its North American customers' data after gaining access…
Malware Network Ransomware Windows6 Min Read September 22, 2025 Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE’s annual endpoint detection and…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
IoT Security Network Ransomware2 Min Read September 21, 2025 Strengthening Cybersecurity in Healthcare: Protecting Patient Data and Ensuring Regulatory Compliance in a Digital Age Cybersecurity in Healthcare As healthcare increasingly relies on digital technologies, the urgency for robust cybersecurity measures has never…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Cyber Espionage Malware4 Min Read September 19, 2025 Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine Cybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating together to target and…
Breach and Attack CISO Press Release Report Research4 Min Read September 18, 2025 Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Palo Alto, California, September 18th, 2025, CyberNewsWire SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32…
Cloud Security Data Breach Network Ransomware2 Min Read September 18, 2025 SolarWinds Issues Advisory on Salesforce Data Breach Linked to Salesloft Drift SolarWinds has issued a security advisory regarding a major Salesforce data breach that exposed sensitive information from numerous companies…
Security3 Min Read September 17, 2025 ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft…
Security2 Min Read September 16, 2025 Jaguar Land Rover extends shutdown after cyberattack by another week Jaguar Land Rover (JLR) announced today that it will extend the production shutdown for another week, following a devastating cyberattack that…
Google Security2 Min Read September 15, 2025 Google confirms fraudulent account created in law enforcement portal Google has confirmed that hackers created a fraudulent account in its Law Enforcement Request System (LERS) platform that law enforcement uses…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Security3 Min Read September 14, 2025 FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’…
Network Phishing Vulnerabilities Windows2 Min Read September 11, 2025 Palo Alto Networks User-ID Credential Agent Vulnerability Exposes password In Cleartext A newly disclosed vulnerability in Palo Alto Networks’ User-ID Credential Agent for Windows, identified as CVE-2025-4235, could…
Ransomware Vulnerability3 Min Read September 11, 2025 SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 11, 2025 Beyond Cobalt Strike: A New Open-Source Hacking Tool Is on the Rise Ddos September 11, 2025 Researchers at Palo Alto Networks’ Unit 42 have published a report detailing the rise of AdaptixC2, an open-source…
Security2 Min Read September 10, 2025 Jaguar Land Rover confirms data theft after recent cyberattack Jaguar Land Rover (JLR) confirmed today that attackers also stole “some data” during a recent cyberattack that forced it to…
Cloud Security Network Ransomware2 Min Read September 9, 2025 Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign A major data theft campaign targeting Salesforce data via the Salesloft Drift app began after threat actors compromised a key GitHub account,…