Archives
- 20 Jul 2025-07-20 Daily Vulns
- 19 Jul 2025-07-19 Daily Vulns
- 18 Jul UK calls out Russian military intelligence for use of espionage tool
- 18 Jul Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- 18 Jul Getting to the Crux (Ransomware) of the Matter
- 18 Jul Follow-Up Cisco Updates Advisory with Additional Maximum Severity Unauthenticated RCE in ISE and ISE-PIC (CVE-2025-20337)
- 18 Jul CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
- 18 Jul 2025-07-18 Daily Vulns
- 17 Jul WordPress Redirect Malware Hidden in Google Tag Manager Code
- 17 Jul Threat hunting case study Lumma infostealer
- 17 Jul The Linuxsys Cryptominer
- 17 Jul NVIDIAScape - Critical NVIDIA AI Vulnerability A Three-Line Container Escape in NVIDIA Container Toolkit (CVE-2025-23266)
- 17 Jul Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
- 17 Jul MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities
- 17 Jul GhostContainer backdoor malware compromising Exchange servers of high-value organizations in Asia
- 17 Jul Flaw in Signal App Clone Could Leak Passwords — GreyNoise Identifies Active Reconnaissance and Exploit Attempts
- 17 Jul Fake Receipts Generators the rising threat to major retail brands
- 17 Jul CryptoJacking is dead, long live CryptoJacking
- 17 Jul British spies and SAS named in Afghan data breach
- 17 Jul 2025-07-17 Daily Vulns
- 16 Jul UNG0002, Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
- 16 Jul Turbulence at Air Serbia, the latest airline under cyber siege
- 16 Jul Salt Typhoon breach Chinese APT compromises U.S. Army National Guard network
- 16 Jul Phish and Chips China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
- 16 Jul Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor
- 16 Jul Old Miner, New Tricks H2miner Resurfaces with Lcrypt0rx Ransomware
- 16 Jul Global operation targets NoName057(16) pro-Russian cybercrime network
- 16 Jul From a Teams Call to a Ransomware Threat Matanbuchus 3.0 MaaS Levels Up
- 16 Jul 2025-07-16 Daily Vulns
- 15 Jul Zyxel security advisory for path traversal vulnerability in APs
- 15 Jul Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
- 15 Jul Tracking Protestware Spread 28 npm Packages Affected by Payload Targeting Russian-Language Users
- 15 Jul Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects
- 15 Jul On the Move Fast Flux in the Modern Threat Landscape
- 15 Jul Konfety Returns Classic Mobile Threat with New Evasion Techniques
- 15 Jul Hyper-volumetric DDoS attacks skyrocket Cloudflare’s 2025 Q2 DDoS threat report
- 15 Jul 2025-07-15 Daily Vulns
- 14 Jul eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks
- 14 Jul KongTuke FileFix Leads to New Interlock RAT Variant
- 14 Jul Google Gemini Tricked Into Showing Phishing Message Hidden in Email
- 14 Jul Global Louis Vuitton data breach impacts UK, South Korea, and Turkey
- 14 Jul GLOBAL GROUP Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
- 14 Jul Forensic journey Breaking down the UserAssist artifact structure
- 14 Jul DOGE Denizen Marko Elez Leaked API Key for xAI
- 14 Jul Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
- 14 Jul Behind the Clouds Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
- 13 Jul Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks
- 13 Jul Chasing Ghosts Over RDP Lateral Movement in Tiny Bitmaps
- 12 Jul OCTALYN STEALER UNMASKED
- 12 Jul 2025-07-12 Daily Vulns
- 11 Jul Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
- 11 Jul GAO finds progress in cyber information sharing, warns of rising attacks on critical infrastructure
- 11 Jul 2025-07-11 Daily Vulns
- 10 Jul macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- 10 Jul Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
- 10 Jul Where Everybody Knows Your Name Observing Malice-Complicit Nameservers
- 10 Jul Rendershock Weaponizing Trust in File Rendering Pipelines
- 10 Jul Ransomware Delivered Through GitHub A PowerShell-Powered Attack
- 10 Jul Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- 10 Jul July Patch Tuesday offers 127 fixes
- 10 Jul Fix the Click Preventing the ClickFix Attack Vector
- 10 Jul Dark Web Profile Arkana Ransomware
- 10 Jul Code highlighting with Cursor AI for $500,000
- 10 Jul At last, a use case for AI agents with sky-high ROI Stealing crypto
- 10 Jul Asus and Adobe vulnerabilities
- 10 Jul AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
- 10 Jul 2025-07-10 Daily Vulns
- 09 Jul Server with Rockerbox Tax Firm Data Exposed 286GB of Records
- 09 Jul Risky Bulletin Browser extensions hijacked for web scraping botnet
- 09 Jul PerfektBlue 1-click RCE attack
- 09 Jul GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
- 09 Jul GitHub Abused to Spread Malware Disguised as Free VPN
- 09 Jul Critical RCE Vulnerability in mcp-remote CVE-2025-6514 Threatens LLM Clients
- 09 Jul Count(er) Strike – Data Inference Vulnerability in ServiceNow
- 09 Jul Attackers Inject Code into WordPress Theme to Redirect Visitors
- 08 Jul Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools
- 08 Jul RDAP and BGP in Investigative Journalism
- 08 Jul Pay2Key’s Resurgence Iranian Cyber Warfare Targets the West
- 08 Jul Malicious pull request infects VS Code extension
- 08 Jul GoldMelody’s Hidden Chords Initial Access Broker In-Memory IIS Modules Revealed
- 08 Jul From Click to Compromise Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
- 08 Jul Combolists and ULP Files on the Dark Web A Secondary and Unreliable Source of Information about Compromises
- 08 Jul Animation-Driven Tapjacking on Android
- 08 Jul Anatsa Targets North America; Uses Proven Mobile Campaign Process
- 08 Jul 2025-07-08 Daily Vulns
- 07 Jul NordDragonScan Quiet Data-Harvester on Windows
- 07 Jul Hackers abuse leaked Shellter red team tool to deploy infostealers
- 07 Jul Digging Gold with a Spoon – Resurgence of Monero-mining Malware
- 07 Jul Deploying NetSupport RAT via WordPress & ClickFix
- 07 Jul CVE-2025-5777 CitrixBleed 2 Write-Up… Maybe?
- 07 Jul Batavia spyware steals data from Russian organizations
- 07 Jul BERT Ransomware Group Targets Asia and Europe on Multiple Platforms
- 06 Jul Critical vulnerabilities in NetScaler ADC exploited in-the-wild everything you need to know
- 05 Jul Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
- 05 Jul Ingram Micro outage caused by SafePay ransomware attack
- 04 Jul Phishing Attack Deploying Malware on Indian Defense BOSS Linux
- 04 Jul NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
- 04 Jul How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)
- 04 Jul Critical Sudo bugs expose major Linux distros to local Root exploits
- 04 Jul 2025-07-04 Daily Vulns
- 03 Jul When Installers Turn Evil The Pascal Script Behind Inno Setup Malware Campaign
- 03 Jul 2025-07-03 Daily Vulns
- 02 Jul macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware
- 02 Jul Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign
- 02 Jul Qantas confirms customer data breach amid Scattered Spider attacks
- 02 Jul June's Dark Gift The Rise of Qwizzserial
- 02 Jul Gamaredon in 2024 Cranking out spearphishing campaigns against Ukraine with an evolved toolset
- 02 Jul Exposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
- 02 Jul Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
- 02 Jul Cl0p cybercrime gang's data exfiltration tool found vulnerable to RCE attacks
- 01 Jul Uncovering DPRK Remote Workers Detecting Hidden Threats Through Internet Telemetry
- 01 Jul Okta observes v0 AI tool used to build phishing sites
- 01 Jul Large Language Models (LLMs) Are Falling for Phishing Scams What Happens When AI Gives You the Wrong URL?
- 01 Jul Iran
- 01 Jul International Criminal Court hit with cyber attack during NATO summit
- 01 Jul Houken seeking a path by living on the edge with zero-days
- 01 Jul Crypto Operation Using Fake Investment Platforms Dismantled in Spain
- 01 Jul Critical Vulnerability in Microsens Devices Exposes Systems to Hackers
- 01 Jul Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be
- 30 Jun Using AI to identify cybercrime masterminds
- 30 Jun Sinaloa drug cartel hired a cybersnoop to identify and kill FBI informants
- 30 Jun Jasper Sleet North Korean remote IT workers’ evolving tactics to infiltrate organizations
- 30 Jun 10 Things I Hate About Attribution RomCom vs. TransferLoader
- 27 Jun Tracing Blind Eagle to Proton66
- 27 Jun The People’s Liberation Army Cyberspace Force
- 27 Jun Stealthy WordPress Malware Drops Windows Trojan via PHP Backdoor
- 27 Jun NSFOCUS APT Monthly Briefing – May 2025
- 27 Jun Hawaiian Airlines Hit by Cybersecurity Incident
- 27 Jun Critical ICS vulnerabilities threaten Mitsubishi Electric and TrendMakers hardware across commercial facilities
- 26 Jun Zero-day Bluetooth gap turns millions of headphones into listening stations
- 26 Jun Taking the shine off BreachForums
- 26 Jun Supply Chain Incident Imperils Glasgow Council Services and Data
- 26 Jun Odyssey Stealer The Rebrand of Poseidon Stealer
- 26 Jun Odyssey Stealer The Rebrand of Poseidon Stealer
- 26 Jun Gogs Remote Command Execution Vulnerability (CVE-2024-56731)
- 26 Jun GIFTEDCROOK’s Strategic Pivot From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
- 26 Jun Extracting Lines of Interest From Zeek Logs
- 26 Jun DeepSeek Deception Sainbox RAT & Hidden Rootkit Delivery
- 26 Jun Decrement by one to rule them all AsIO3.sys driver exploitation
- 26 Jun Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Commands
- 25 Jun The Case of Hidden Spam Pages
- 25 Jun Surge in MOVEit Transfer Scanning Could Signal Emerging Threat Activity
- 25 Jun Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing
- 25 Jun Patch and Persist Darktrace’s Detection of Blind Eagle (APT-C-36)
- 25 Jun Iranian Educated Manticore Targets Leading Tech Academics
- 25 Jun In the Wild Malware Prototype with Embedded Prompt Injection
- 25 Jun Cybercriminal abuse of large language models
- 25 Jun Cybercrime is surging across Africa
- 25 Jun Crash (exploit) and burn Securing the offensive cyber supply chain to counter China in cyberspace
- 25 Jun 2025-06-25 Daily Vulns
- 24 Jun Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent
- 24 Jun Russia-linked APT28 use Signal chats to target Ukraine official with malware
- 24 Jun OneClik A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure
- 24 Jun Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
- 24 Jun Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
- 24 Jun Cryptominers’ Anatomy Shutting Down Mining Botnets
- 24 Jun China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
- 24 Jun Another Wave North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
- 24 Jun 2025-06-24 Daily Vulns
- 23 Jun Trix Shots Remote Code Execution on Aviatrix Controller
- 23 Jun SparkKitty, SparkCat’s little brother A new Trojan spy found in the App Store and Google Play
- 23 Jun Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor
- 23 Jun Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
- 23 Jun ConnectUnwise Threat actors abuse ConnectWise as builder for signed malware
- 23 Jun Chinese “LapDogs” ORB Network Targets US and Asia
- 22 Jun Iran-Linked Threat Actors Leak Visitors and Athletes' Data from Saudi Games
- 22 Jun Androxgh0st Continues Exploitation Operators Compromise a US University For Hosting C2 Logger
- 21 Jun APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
- 21 Jun 2025-06-21 Daily Vulns
- 20 Jun Zoom & doom BlueNoroff call opens the door
- 20 Jun Resurgence of the Prometei Botnet
- 20 Jun Aflac notifies SEC of breach suspected to be work of Scattered Spider
- 19 Jun Part 2 Tracking LummaC2 Infrastructure
- 19 Jun Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
- 19 Jun 2025-06-19 Daily Vulns
- 18 Jun What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
- 18 Jun What’s Inside the Massive Chinese Data Leak
- 18 Jun Threat actor Banana Squad exploits GitHub repos in new campaign
- 18 Jun Same Sea, New Phish, Russian Government-Linked Social Engineering Targets App-Specific Passwords
- 18 Jun Ransomware Gangs Collapse as Qilin Seizes Control
- 18 Jun Fault Injection – Follow the White Rabbit
- 18 Jun Famous Chollima deploying Python version of GolangGhost RAT
- 18 Jun Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
- 17 Jun Smart air fryers ordered to stop invading our digital privacy
- 17 Jun Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience Platform
- 17 Jun How Fraudsters Are Poisoning Search Results to Promote Phishing Sites
- 17 Jun Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet
- 17 Jun 2025-06-17 Daily Vulns
- 16 Jun Washington Post's email system hacked, journalists' accounts compromised
- 16 Jun VMOSX Data Leak Info of Thousands of Mac Cloud Users Potentially Exposed Online
- 16 Jun Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
- 16 Jun Scattered Spider has moved from retail to insurance
- 16 Jun Report Links Los Pollos and RichAds to Malware Traffic Operations
- 16 Jun PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
- 16 Jun Kali Linux 2025.2 released with 13 new tools, car hacking updates
- 16 Jun Is your AI safe? Threat analysis of MCP (Model Context Protocol)
- 16 Jun Fileless AsyncRAT Distributed Via Clickfix Technique Targeting German Speaking Users
- 16 Jun Clone, Compile, Compromise Water Curse’s Open-Source Malware Trap on GitHub
- 16 Jun CYFIRMA INDUSTRY REPORT – HEALTHCARE
- 16 Jun 2025-06-16 Daily Vulns
- 14 Jun 2025-06-14 Daily Vulns
- 13 Jun Paraguay is Being Targeted by Cybercriminals - 7.4 Million Citizen Records for Sale
- 13 Jun Anubis A Closer Look at an Emerging Ransomware with Built-in Wiper
- 13 Jun Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User
- 13 Jun 2025-06-13 Daily Vulns
- 12 Jun Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
- 12 Jun The TokenBreak Attack
- 12 Jun Sweden says it is under cyber attack
- 12 Jun Ransomware scum disrupted utility services with SimpleHelp attacks
- 12 Jun Ransomware Scum Disrupted Utility Services with SimpleHelp Attacks
- 12 Jun New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches
- 12 Jun NAT and Packet Capture
- 12 Jun JSFireTruck Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
- 12 Jun Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
- 12 Jun Inside FluxPanel How Phishing Enables Real-Time Ecommerce Checkout Hijacks
- 12 Jun Graphite Caught, First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
- 12 Jun GitHub Device Code Phishing
- 12 Jun From Trust to Threat Hijacked Discord Invites Used for Multi-Stage Malware Delivery
- 12 Jun Fog Ransomware Unusual Toolset Used in Recent Attack
- 12 Jun EchoLeak Zero-Click AI Attack in Microsoft Copilot Exposes Company Data
- 12 Jun Don't Get Caught in the Headlights - DeerStealer Analysis
- 12 Jun 2025-06-12 Daily Vulns
- 11 Jun Toxic trend Another malware threat targets DeepSeek
- 11 Jun Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud
- 11 Jun Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited
- 11 Jun NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
- 11 Jun Global analysis of Adversary-in-the-Middle phishing threats
- 11 Jun Attackers Unleash TeamFiltration Account Takeover Campaign (UNK_SneakyStrike) Leverages Popular Pentesting Tool
- 11 Jun APT PROFILE – MISSION2025
- 11 Jun 2025-06-11 Daily Vulns
- 10 Jun Unmasking the Infrastructure of a Spearphishing Campaign
- 10 Jun The Evolution of Linux Binaries in Targeted Cloud Operations
- 10 Jun Telegram Messenger's Ties to Russia's FSB Revealed in New Report
- 10 Jun Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)
- 10 Jun Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
- 10 Jun Peep show 40K IoT cameras worldwide stream secrets to anyone with a browser
- 10 Jun Flask Phishing Kit Targeted Credential Theft Using Open-Source Technology
- 10 Jun Critical Vulnerability Patched in SAP NetWeaver
- 10 Jun Coordinated Brute Force Activity Targeting Apache Tomcat Manager Indicates Possible Upcoming Threats
- 10 Jun CVE-2025-33053, Stealth Falcon and Horus A Saga of Middle Eastern Cyber Espionage
- 10 Jun A vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variable
- 09 Jun iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals
- 09 Jun Two Botnets, One Flaw Mirai Spreads Through Wazuh Vulnerability
- 09 Jun Sleep with one eye open how Librarian Ghouls steal data by night
- 09 Jun PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites
- 09 Jun Grocery wholesale giant United Natural Foods hit by cyberattack
- 09 Jun GhostVendors Exposed Silent Push Uncovers Massive Network of 4000+ Fraudulent Domains Masquerading as Major Brands
- 09 Jun Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
- 09 Jun Eggs in a Cloudy Basket Skeleton Spider’s Trusted Cloud Malware Delivery
- 09 Jun DanaBleed DanaBot C2 Server Memory Leak Bug
- 09 Jun Analysis of the Triple Combo Threat of the Kimsuky Group
- 09 Jun APT 41 Threat Intelligence Report and Malware Analysis
- 07 Jun 2025-06-07 Daily Vulns
- 06 Jun The FBI Issued a Warning About This Malware That's Infecting Millions of Devices
- 06 Jun Operation DRAGONCLONE Chinese Telecommunication industry targeted via VELETRIX & VShell malware
- 06 Jun Mapping Hidden Alliances in Russian-Affiliated Ransomware
- 06 Jun Blitz Malware A Tale of Game Cheats and Code Repositories
- 06 Jun Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
- 06 Jun 2025-06-06 Daily Vulns
- 05 Jun What Really Happened in the Aftermath of the Lizard Squad Hacks
- 05 Jun Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
- 05 Jun Proxy Services Feast on Ukraine’s IP Address Exodus
- 05 Jun Operation Endgame Disrupts AvCheck, Forces Threat Actors to Seek Alternatives
- 05 Jun Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
- 05 Jun ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
- 05 Jun Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known
- 05 Jun BladedFeline Whispering in the dark
- 05 Jun Android Spyware Alert! Fake government app targeting Android users in India!
- 05 Jun Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
- 05 Jun 2025-06-05 Daily Vulns
- 04 Jun The strange tale of ischhfd83 When cybercriminals eat their own
- 04 Jun The Cost of a Call From Voice Phishing to Data Extortion
- 04 Jun The Bitter End Unraveling Eight Years of Espionage Antics—Part One
- 04 Jun StormWall Reveals India, China and US Faced Most DDoS Attacks in Q1 2025
- 04 Jun Same Automated Impersonation for All
- 04 Jun Roundcube Webmail under fire critical exploit found after a decade
- 04 Jun Multiple CVEs in Infoblox NetMRI RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
- 04 Jun Global Conflicts in the Digital Age – How Geopolitics Influence Cyber Operations
- 04 Jun From open-source to open threat Tracking Chaos RAT’s evolution
- 04 Jun Fake WordPress Caching Plugin Used to Steal Admin Credentials
- 04 Jun Criminals Bribed Outsourced Contractors to Steal Coinbase User Data
- 04 Jun Android malware trends Stealthier, easier-to-use
- 03 Jun The Rising Tide Understanding the Surge in Cyber Attacks in India
- 03 Jun The Hidden Cost of Trust New Data Reveals Alarming Employee Engagement with Vendor Email Compromise
- 03 Jun Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable
- 03 Jun How Threat Actors Exploit Human Trust A Breakdown of the 'Prove You Are Human' Malware Scheme
- 03 Jun Crocodilus Mobile Malware Evolving Fast, Going Global
- 02 Jun Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
- 02 Jun Versa Concerto Understanding and Mitigating CVE-2025-34027
- 02 Jun US community bank says thieves drained customer data through third party hole
- 02 Jun Qualcomm fixes three Adreno GPU zero-days exploited in attacks
- 02 Jun New Linux Vulnerabilities Expose Password Hashes via Core Dumps
- 02 Jun Malicious Ruby Gems Exfiltrate Telegram Tokens and Messages Following Vietnam Ban
- 02 Jun Incorrect permission assignment on Universal Forwarder for Windows during new installation or upgrade
- 02 Jun Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
- 02 Jun Backdoors in Python and NPM Packages Target Windows and Linux
- 02 Jun Alleged Conti, TrickBot Gang Leader Unmasked
- 02 Jun Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- 01 Jun mommy Access Broker
- 30 May XSSing TypeErrors in Safari
- 30 May Interlock ransomware what you need to know
- 30 May Exploits and vulnerabilities in Q1 2025
- 29 May When Samsung's Magic Turns Tragic A Tale of Unauthorized Mining
- 29 May Tracking LummaC2 Infrastructure with Cats
- 29 May Threat Hunting C2 over HTTPS Connections Using the TLS Certificate
- 29 May Surveillance Via Smart Toothbrush
- 29 May Russian-linked hackers target UK Defense Ministry while posing as journalists
- 29 May Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
- 29 May Monkey-Patched PyPI Packages Use Transitive Dependencies to Steal Solana Private Keys
- 29 May Haozi’s Plug-and-Play Phishing-as-a-Service Has Facilitated $280,000 of Criminal Transactions Over Past Five Months
- 29 May Emulating the Unyielding Scattered Spider
- 29 May Deep Dive into a Dumped Malware without a PE Header
- 29 May Cybercriminals camouflaging threats as AI tool installers
- 28 May Zanubis in motion Tracing the active evolution of the Android banking malware
- 28 May Restless Guests The True Entra B2B Guest Threat Model
- 28 May Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
- 28 May NHS trusts' data 'stolen' in cyberattack
- 28 May Mark Your Calendar APT41 Innovative Tactics
- 27 May The Sharp Taste of Mimo’lette Analyzing Mimo’s Latest Campaign targeting Craft CMS
- 27 May Text-to-Malware How Cybercriminals Weaponize Fake AI-Themed Websites
- 27 May New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
- 27 May Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- 27 May MATLAB dev confirms ransomware attack behind service outage
- 27 May Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
- 27 May Earth Lamia Develops Custom Arsenal to Target Multiple Industries
- 27 May DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
- 27 May Crypto & Investment scams exploiting the Tesla brand
- 27 May Coordinated Cloud-Based Scanning Operation Targets 75 Known Exposure Points in One Day
- 27 May AIVD and MIVD identify new Russian cyber threat actor
- 26 May SilverRAT Source Code Leaked Online Here’s What You Need to Know
- 26 May Reborn in Rust AsyncRAT
- 26 May Eye of the Storm Dissecting the Playbook of Cyber Toufan
- 23 May Operation Sindoor – Anatomy of a Digital Siege
- 23 May Bypassing MTE with CVE-2025-0072