CYBERSECURITY 197
- The Beast Returns Analysis of a Beast Ransomware Server
- Crypto Scam 'ShieldGuard' Dismantled After Malware Discovery
- Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
- Warlock Ransomware Group Enhances Post-Exploitation Techniques
- Katana A Mirai Variant Targeting Android TV Set-Top Boxes
- How to Examine Polyglot Files with Spectra Analyze
- CODESYS Vulnerabilities in Festo Automation Suite
- Qihoo 360 Leaked Its Own Wildcard SSL Private Key Inside Public AI Installer
- Researchers Find Data Leak Risk in AWS Bedrock AI Code Interpreter
- Researchers Warn of Global Surge in Fake Shipment Tracking Scams
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
- China-Linked Hackers Target Asian Militaries in Espionage Operation
- Payload Ransomware Claims the Hack of Royal Bahrain Hospital
- Credential-Stealing Crew Spoofs VPN Clients from Cisco, Fortinet, and Others
- The Market for Spyware is Growing - It’s Used Differently Against Women
- Escorted Out! Major Cybersecurity Takedown
- Announcing Pwn2Own Berlin for 2026
- AI-Generated Slopoly Malware Used in Interlock Ransomware Attack
- Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
- INC Ransomware Group Holds Healthcare Hostage in Oceania
- A Foreign Hacker Accessed FBI Files on Epstein Back in 2023 - Report
- Sednit Reloaded - Back in the Trenches
- APT28 Conducts Long-Term Espionage on Ukrainian Forces Using Custom Malware
- Quiz Sites Trick Users into Enabling Unwanted Browser Notifications
- EV Charger Company ELECQ Hit by Ransomware Attack, Customer Data Compromised
- New Social Security Scam Emails Use Fake Tax Documents to Hijack PCs
- Russian APT Targets Ukraine with BadPaw and MeowMeow Malware
- Manufacturing Supply Chains Face Cascading Cyber Risk as Third-Party Breaches Hit Record Levels
- Delta Electronics CNCSoft-G2 Vulnerability Advisory
- Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
- Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations
- Cisco Fixes Maximum-Severity Secure FMC Bugs Threatening Firewall Security
- Ransomware Attack Exposes 1.2 Million University of Hawaii Cancer Center Records
- Most Cybercriminals Are Middle-Aged New Data Reveals
- Coruna - Inside the Nation-State
- Dust Specter APT Targets Government Officials in Iraq
- Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages
- Exorcising Demons - Fake Tech Support Delivers Havoc Command & Control
- Apt37 Adds New Capabilities for Air Gapped Networks
- UFP Technologies Discloses Data Breach After Cybersecurity Incident
- Five Eyes Urgent Warning Patch Your Cisco SD-WAN to Prevent Root Takeover!
- Vshell - A Chinese-Language Alternative to Cobalt Strike
- Treasury Sanctions Exploit Broker Network for Cyber Tools Theft
- SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
- Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker
- Massiv The New Threat to Your Mobile Banking Security
- Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
- Data Breaches in 2026 - What’s Old, What’s New?
- Another Day, Another Malicious JPEG
- 2025 - The Untold Stories of Check Point Research
- Another Day, Another Malicious JPEG
- Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack
- LLMs in the Kill Chain - Inside a Custom MCP Targeting FortiGate Devices Across Continents
- Digital Skimmer Hits Global Supermarket Chain
- Trump Administration's AI Cybersecurity Strategy Unveiled
- Hackers Made Death Threats Against Security Researcher A Big Mistake
- Chinese APT Group Exploits Dell Zero-Day for Two Years
- Aussie Fintech Platform Youx Confirms Data Breach As Hacker Shares Massive Dataset Online
- SmartLoader Hackers Clone Oura MCP Project to Spread StealC Malware
- Keenadu The Tablet Conqueror and Major Android Botnets
- Fake Incident Report Used in Phishing Campaign
- Delta Electronics ASDA-Soft Vulnerability Advisory
- RoguePilot - Exploiting GitHub Copilot for a Repository Takeover
- Threat Actor Selling OpenSea 0-Day Exploit for $100,000
- Suspected Russian Hackers Deploy CANFAIL Malware Against Ukraine
- Operation Macromaze APT28's New Campaign Unveiled
- Icedid Malware Developer Fakes His Own Death To Escape The FBI
- Hand Over the Keys for Shannon’s Shenanigans
- Siemens Siveillance Video Management Servers Vulnerability Advisory
- Odido Confirms Massive Data Breach Affecting 6.2 Million Customers
- LummaStealer Activity Surges After Law Enforcement Disruption
- Critical Vulnerability in Airleader Master Exposed
- Kimwolf Botnet Disrupts I2P Network
- When Paychecks Become the Prize - A Deeper Look at the Rise of Direct Deposit Attacks
- Pulling Back the Curtain on Warlock's Next Act
- Fake Recruiter Campaign Targets Crypto Developers
- Conduent Case Unveiled Volvo Reports Third-Party Compromise
- Pride Month Phishing Targets Employees via Trusted Email Services
- Man Tricked Hundreds of Women into Handing Over Snapchat Security Codes
- Largest Multi Agency Cyber Operation Launched Against APT Threats
- European Commission Investigates Cyberattack on Mobile Device Management System
- Beware of Fake 7-Zip Downloads Turning PCs into Proxy Nodes!
- UK Construction Firm Targeted by Prometei Botnet in Windows Server
- Italian University La Sapienza Offline After Cyber Attack
- BridgePay Confirms Ransomware Attack Behind Outage
- Web Traffic Hijacking Malicious Nginx Configurations Uncovered
- The Shadow Campaigns - Uncovering Global Espionage
- Italy Blames Russia-Linked Hackers for Cyberattacks Ahead of Winter Olympics
- APT28 - Geofencing as a Targeting Signal (CVE-2026-21509 Campaign)
- DockerDash Exposes AI Supply Chain Weakness In Docker's Ask Gordon
- When Hacktivists Target Water Utilities - Inside a Russian-Aligned OT Attack
- Vulnerability Alert Mitsubishi Electric FREQSHIP-mini for Windows
- Critical Vulnerability in Synectix LAN 232 TRIO Exposed
- AT&T Breach Data Resurfaces with New Risks for Customers
- Mutagen Astronomy From Discovery to CISA Recognition—A Seven-Year Journey
- 341 Malicious ClawHub Skills Discovered Stealing User Data
- Cant Stop Wont Stop Ta584 Innovates Initial Access
- Why has Microsoft been routing example.com traffic to a company in Japan?
- ESET Research - Sandworm behind cyberattack on Poland’s power grid in late 2025
- Ticket to Shell - Exploiting PHP Filters and CNEXT in osTicket (CVE-2026-22200)
- Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
- German Manufacturing Under Phishing Attacks - Tracking a Stealthy AsyncRAT Campaign
- China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
- Ledger Confirms Global-e Breach, Warns Users of Phishing Attempts
- Knownsec leak unmasks secret cyberweapons and role in China’s state-linked spying
- Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks
- Think Like an Attacker - Cybersecurity Tips From Cato Networks' CISO
- CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
- Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite
- Hackers say Volkswagen dealership’s client list is now for sale
- MuddyWater Snakes by the riverbank
- Everest Ransomware Claims ASUS Breach and 1TB Data Theft
- Over 2,000 Fake Shopping Sites Spotted Before Cyber Monday
- ThreatsDay Bulletin - AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
- Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
- Cyber-Attack Disrupts OnSolve CodeRED Emergency Notification System
- KawaiiGPT – New Black-Hat AI Tool Used by Hackers to Launch Cyberattacks
- Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims
- Self-replicating botnet attacks Ray clusters
- Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
- What Should A Modern Cybersecurity Stack Look Like?
- One World, Many Threats - How Regional Realities Shape Global Cyber Defense
- Fortinet’s delayed alert on actively exploited defect put defenders at a disadvantage
- Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform
- Phishers try to lure 5K Facebook advertisers with fake business pages
- Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
- UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities
- New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
- Aisuru Botnet Shifts from DDoS to Residential Proxies
- OpenAI Atlas Browser Vulnerability Allows Malicious Code Injection into ChatGPT
- Everest Ransomware Says It Stole 1.5M Dublin Airport Passenger Records
- Anomali Cyber Watch - Nimbus Manticore, Spoofed IC3 Portals, a Record-Breaking DDoS Attack, and More
- Cyber defenders sound the alarm as F5 hack exposes broad risks
- China Accuses US of Cyberattack on National Time Center
- Collins Aerospace attack claimed by Everest, linking ransomware group to last month's European airport chaos
- From Phishing to Malware AI Becomes Russia's New Cyber Weapon in War on Ukraine
- CometJacking One Click Can Turn Perplexity's Comet AI Browser Into a Data Thief
- Microsoft Flags AI-Driven Phishing LLM-Crafted SVG Files Outsmart Email Security
- EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
- Cisco Talos attributes Asian telecom and manufacturing attacks to Naikon PlugX campaign
- Heathrow Airport Cyberattack What Happened, Who’s Affected, and What CISOs Should Know
- Car giant Stellantis says customer data nicked after partner vendor pwned
- BreachForums Owner Sent to Prison in Resentencing
- New Yurei Ransomware With PowerShell Commands Encrypts Files With ChaCha20 Algorithm
- IBM QRadar SIEM Vulnerability Let Attackers Perform Unauthorized Actions
- Actors Behind AppSuite-PDF and PDF Editor Used 26 Code-Signing Certificates to Make Software Appear Legitimate
- New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems
- Vietnam investigates cyberattack on creditors data
- China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations
- Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack
- NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
- Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices
- New Phishing Attack Via OneDrive Attacking C-level Employees for Corporate Credentials
- Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments
- Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization
- Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
- CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors
- Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
- Hackers steal data from Salesforce instances in widespread campaign
- FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
- UK-based Telecommunications Company Colt Technology Services Hit by Major Cyberattack
- Cyberattack on Dutch prosecution service is keeping speed cameras offline
- Cybersecurity in Focus Recent Threats Targeting India Amid Independence Day Celebrations
- Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
- Update WinRAR tools now RomCom and others exploiting zero-day vulnerability
- ShadowSyndicate Infrastructure Used by Multiple Ransomware Groups Including Cl0p, LockBit and RansomHub
- Frozen in transit Secret Blizzard’s AiTM campaign against diplomats
- Cybercriminals Attack Seychelles – Offshore Banking as a Target
- Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware
- Ports are getting smarter and more hackable
- HAFNIUM-Linked Hacker Xu Zewei Riding the Tides of China’s Cyber Ecosystem
- CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
- Turbulence at Air Serbia, the latest airline under cyber siege
- From a Teams Call to a Ransomware Threat Matanbuchus 3.0 MaaS Levels Up
- Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
- Dark Web Profile Arkana Ransomware
- Batavia spyware steals data from Russian organizations
- macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware
- Qantas confirms customer data breach amid Scattered Spider attacks
- International Criminal Court hit with cyber attack during NATO summit
- Hawaiian Airlines Hit by Cybersecurity Incident
- Iran-Linked Threat Actors Leak Visitors and Athletes' Data from Saudi Games
- Androxgh0st Continues Exploitation Operators Compromise a US University For Hosting C2 Logger
- Fileless AsyncRAT Distributed Via Clickfix Technique Targeting German Speaking Users
- Clone, Compile, Compromise Water Curse’s Open-Source Malware Trap on GitHub
- Anubis A Closer Look at an Emerging Ransomware with Built-in Wiper
- APT 41 Threat Intelligence Report and Malware Analysis
- Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known
- mommy Access Broker
- Russian-linked hackers target UK Defense Ministry while posing as journalists
- Cybercriminals camouflaging threats as AI tool installers
- NHS trusts' data 'stolen' in cyberattack
- Credential-Stealing Crew Spoofs VPN Clients from Cisco, Fortinet, and Others
- Payload Ransomware Claims Hack of Royal Bahrain Hospital
- AppsFlyer Web SDK Hijacked to Spread Crypto-Stealing JavaScript Code