CYBER SECURITY 43
- LockBit 5.0 Infrastructure Exposed in New Server, IP, and Domain Leak
- 29.7 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record
- Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations
- Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
- Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks
- Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges
- New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls
- RONINGLOADER Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools
- Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell
- Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
- Data breach at Chinese infosec firm reveals cyber-weapons and target list
- List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
- HackedGPT – 7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks
- Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
- Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
- OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
- Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
- PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation
- Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0
- Hackers Actively Compromising Databases Using Legitimate Commands
- 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System
- New WireTap Attack Breaks Server SGX to Exfiltrate Sensitive Data
- SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG Files
- New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing
- Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
- Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
- Hackers Leverage AI-Generated Code to Obfuscate Its Payload and Evade Traditional Defenses
- CISA Details That Hackers Gained Access to a U.S. Federal Agency Network Via GeoServer RCE Vulnerability
- 22.2 Tbps DDoS Attack Breaks Internet With New World Record
- Google Chrome 0-Day Vulnerability Actively Exploited in the Wild – Patch Now
- FinWise Insider Breach Exposes 700K Customer Records to Former Employee
- New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
- Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
- New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection
- Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer
- New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay
- Search Engines are Indexing ChatGPT Conversations! – Here is our OSINT Research
- UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure
- JSCEAL Targets Crypto App Users – A New Threat in the Cyber Security Landscape
- Iranian Educated Manticore Targets Leading Tech Academics
- Scattered Spider has moved from retail to insurance
- Sweden says it is under cyber attack
- CVE-2025-33053, Stealth Falcon and Horus A Saga of Middle Eastern Cyber Espionage