Cybersecurity Hacking News3 Min Read October 23, 2025 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse…
Cybersecurity Malware2 Min Read October 22, 2025 Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations…
Browser Security Malware2 Min Read October 20, 2025 131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Cybersecurity Hacking News15 Min Read October 16, 2025 ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it's become to turn everyday technology into a…
Malware Software Supply Chain3 Min Read October 15, 2025 Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by…
Server Security Vulnerability1 Min Read October 15, 2025 Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations,…
Apple Malware Ransomware Vulnerabilities4 Min Read October 15, 2025 Sekoia Exposes PolarEdge Backdoor: Custom mbedTLS C2 Compromising Cisco, QNAP, and Synology Devices Sekoia Threat Detection & Response (TDR) researchers have published an in-depth technical analysis of the PolarEdge Backdoor, a stealthy…
Malware Phishing Ransomware Social Engineering2 Min Read October 14, 2025 Hacker Group TA585 Emerges With Advanced Attack Infrastructure A newly identified cybercriminal group, TA585, has been uncovered by cybersecurity researchers for running one of the most autonomous and…
Malware Social Engineering2 Min Read October 14, 2025 Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585 that has been observed delivering an…
Android Malware Phishing Ransomware2 Min Read October 13, 2025 Spain Arrests Alleged Leader of GXC Team Cybercrime Network Spanish authorities have arrested a 25-year-old Brazilian national accused of leading the “GXC Team” – a…
Apple Malware Ransomware Windows2 Min Read October 13, 2025 New Stealit Malware Campaign Spreads via VPN and Game Installer Apps Threat actors are conducting a new malicious campaign deploying the Stealit malware via disguised applications, according to Fortinet. The…
Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Financial Security Malware2 Min Read October 13, 2025 Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone…
Data Theft Ransomware2 Min Read October 10, 2025 Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable…
Children Cyber Attack Cyber Crime Cybersecurity Kido Nursery Privacy United Kingdom2 Min Read October 8, 2025 UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack The UK Metropolitan Police (Met) have arrested two 17-year-old boys in connection with the major ransomware attack that compromised the data…
Cybersecurity Discord Identity theft Infostealer Malware Point Wild Privacy Security Shuyal Stealer Windows3 Min Read October 8, 2025 New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have found a new infostealer called Shuyal Stealer, a malware…
Artificial Intelligence Threat Intelligence5 Min Read October 8, 2025 OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…
Data Breach Phishing Ransomware Vulnerabilities6 Min Read October 7, 2025 ShinyHunters Wage Broad Corporate Extortion Spree A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…
C2 command-and-control DDoS Malware Phishing Ransomware rce Stealer TROJAN Windows2 Min Read October 7, 2025 XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of…
Android Malware Mobile TROJAN VPN3 Min Read October 6, 2025 New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the…
Cyber Espionage Network Security3 Min Read October 6, 2025 New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the…
Security4 Min Read October 6, 2025 XWorm malware resurfaces with ransomware module, over 35 plugins New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…
Mobile Security3 Min Read October 1, 2025 Android malware uses VNC to give attackers hands-on access A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000…
Malware Mobile Security3 Min Read October 1, 2025 New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections…
Android Botnets Malware Ransomware2 Min Read September 30, 2025 New Android RAT Klopatra Targets Financial Data A previously unknown Android Remote Access Trojan (RAT) has been identified by security researchers, marking a significant advancement in the…
Cybercrime Mobile Security4 Min Read September 30, 2025 New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO)…
Data Breach Phishing Ransomware Vulnerabilities12 Min Read September 28, 2025 Cybersecurity Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the…
Malware Phishing Ransomware3 Min Read September 28, 2025 AsyncRAT Malware Campaign Found Targeting South American Hotels A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…
Facebook Fraud Google Malware Scam Security TradingView2 Min Read September 26, 2025 Google Ads Used to Spread Trojan Disguised as TradingView Premium A malicious advertising campaign that has been tricking content creators and unsuspecting users into downloading harmful software by offering…
Security Technology2 Min Read September 25, 2025 Amazon pays $2.5 billion to settle Prime memberships lawsuit Amazon will pay $2.5 billion to settle claims by the U.S. Federal Trade Commission (FTC) that it used dark patterns to trick millions of users…
Botnets Malware Phishing Windows2 Min Read September 25, 2025 Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment…
Cryptocurrency Malware5 Min Read September 25, 2025 North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented…
Anti-Malware Research6 Min Read September 25, 2025 The Scam That Won’t Quit: Malicious “TradingView Premium” Ads Jump from Meta to Google and YouTube Over the past year, Bitdefender researchers have been monitoring a persistent malicious campaign that initially spread via Facebook Ads,…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Cloud Security DDoS Malware Ransomware2 Min Read September 24, 2025 ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms A new campaign that combines traditional malware with modern DevOps tooling has been observed by cybersecurity analysts. The ShadowV2 DDoS…
DDoS Malware Nation-state Ransomware4 Min Read September 24, 2025 Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence) Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the…
Malware Nation-state Network Ransomware2 Min Read September 24, 2025 Cisco Uncovers New PlugX Backdoor Linked to Chinese APTs Researchers at Cisco Talos have uncovered a long-running espionage campaign active since 2022, targeting the telecommunications and…
Botnet Cloud Security4 Min Read September 23, 2025 ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service…
Cloud Security Malware Phishing Ransomware4 Min Read September 22, 2025 Organizations Must Update Defenses to Scattered Spider Tactics, Experts Urge Organizations must urgently update their defenses to protect against tactics deployed by the Scattered Spider hacking collective this year,…
Cybercrime Malware3 Min Read September 18, 2025 CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to…