CYBERSECURITY 109
- Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- Getting to the Crux (Ransomware) of the Matter
- The Linuxsys Cryptominer
- Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
- CryptoJacking is dead, long live CryptoJacking
- UNG0002, Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
- Salt Typhoon breach Chinese APT compromises U.S. Army National Guard network
- Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor
- Old Miner, New Tricks H2miner Resurfaces with Lcrypt0rx Ransomware
- Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects
- On the Move Fast Flux in the Modern Threat Landscape
- Hyper-volumetric DDoS attacks skyrocket Cloudflare’s 2025 Q2 DDoS threat report
- eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks
- KongTuke FileFix Leads to New Interlock RAT Variant
- GLOBAL GROUP Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
- Behind the Clouds Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
- Chasing Ghosts Over RDP Lateral Movement in Tiny Bitmaps
- GAO finds progress in cyber information sharing, warns of rising attacks on critical infrastructure
- Where Everybody Knows Your Name Observing Malice-Complicit Nameservers
- Rendershock Weaponizing Trust in File Rendering Pipelines
- Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- Fix the Click Preventing the ClickFix Attack Vector
- Code highlighting with Cursor AI for $500,000
- AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
- GitHub Abused to Spread Malware Disguised as Free VPN
- From Click to Compromise Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
- Combolists and ULP Files on the Dark Web A Secondary and Unreliable Source of Information about Compromises
- NordDragonScan Quiet Data-Harvester on Windows
- Hackers abuse leaked Shellter red team tool to deploy infostealers
- Deploying NetSupport RAT via WordPress & ClickFix
- BERT Ransomware Group Targets Asia and Europe on Multiple Platforms
- NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
- When Installers Turn Evil The Pascal Script Behind Inno Setup Malware Campaign
- Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign
- Exposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
- Okta observes v0 AI tool used to build phishing sites
- Houken seeking a path by living on the edge with zero-days
- Critical Vulnerability in Microsens Devices Exposes Systems to Hackers
- Jasper Sleet North Korean remote IT workers’ evolving tactics to infiltrate organizations
- Hawaiian Airlines Hit by Cybersecurity Incident
- Odyssey Stealer The Rebrand of Poseidon Stealer
- Odyssey Stealer The Rebrand of Poseidon Stealer
- DeepSeek Deception Sainbox RAT & Hidden Rootkit Delivery
- Patch and Persist Darktrace’s Detection of Blind Eagle (APT-C-36)
- Cybercrime is surging across Africa
- Crash (exploit) and burn Securing the offensive cyber supply chain to counter China in cyberspace
- OneClik A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure
- Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
- Cryptominers’ Anatomy Shutting Down Mining Botnets
- Chinese “LapDogs” ORB Network Targets US and Asia
- APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
- Zoom & doom BlueNoroff call opens the door
- Resurgence of the Prometei Botnet
- Aflac notifies SEC of breach suspected to be work of Scattered Spider
- Part 2 Tracking LummaC2 Infrastructure
- Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
- What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
- Threat actor Banana Squad exploits GitHub repos in new campaign
- Ransomware Gangs Collapse as Qilin Seizes Control
- How Fraudsters Are Poisoning Search Results to Promote Phishing Sites
- PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
- Kali Linux 2025.2 released with 13 new tools, car hacking updates
- Is your AI safe? Threat analysis of MCP (Model Context Protocol)
- Fileless AsyncRAT Distributed Via Clickfix Technique Targeting German Speaking Users
- Anubis A Closer Look at an Emerging Ransomware with Built-in Wiper
- Ransomware Scum Disrupted Utility Services with SimpleHelp Attacks
- JSFireTruck Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
- Fog Ransomware Unusual Toolset Used in Recent Attack
- Toxic trend Another malware threat targets DeepSeek
- Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud
- Global analysis of Adversary-in-the-Middle phishing threats
- Unmasking the Infrastructure of a Spearphishing Campaign
- iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals
- Sleep with one eye open how Librarian Ghouls steal data by night
- GhostVendors Exposed Silent Push Uncovers Massive Network of 4000+ Fraudulent Domains Masquerading as Major Brands
- Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
- DanaBleed DanaBot C2 Server Memory Leak Bug
- Mapping Hidden Alliances in Russian-Affiliated Ransomware
- Operation Endgame Disrupts AvCheck, Forces Threat Actors to Seek Alternatives
- Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known
- Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
- The strange tale of ischhfd83 When cybercriminals eat their own
- The Bitter End Unraveling Eight Years of Espionage Antics—Part One
- StormWall Reveals India, China and US Faced Most DDoS Attacks in Q1 2025
- From open-source to open threat Tracking Chaos RAT’s evolution
- Criminals Bribed Outsourced Contractors to Steal Coinbase User Data
- Android malware trends Stealthier, easier-to-use
- The Hidden Cost of Trust New Data Reveals Alarming Employee Engagement with Vendor Email Compromise
- How Threat Actors Exploit Human Trust A Breakdown of the 'Prove You Are Human' Malware Scheme
- Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
- Malicious Ruby Gems Exfiltrate Telegram Tokens and Messages Following Vietnam Ban
- Backdoors in Python and NPM Packages Target Windows and Linux
- Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- Interlock ransomware what you need to know
- Monkey-Patched PyPI Packages Use Transitive Dependencies to Steal Solana Private Keys
- Haozi’s Plug-and-Play Phishing-as-a-Service Has Facilitated $280,000 of Criminal Transactions Over Past Five Months
- Cybercriminals camouflaging threats as AI tool installers
- Zanubis in motion Tracing the active evolution of the Android banking malware
- Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
- Text-to-Malware How Cybercriminals Weaponize Fake AI-Themed Websites
- New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
- Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
- Earth Lamia Develops Custom Arsenal to Target Multiple Industries
- AIVD and MIVD identify new Russian cyber threat actor
- SilverRAT Source Code Leaked Online Here’s What You Need to Know
- Reborn in Rust AsyncRAT
- Eye of the Storm Dissecting the Playbook of Cyber Toufan
- Operation Sindoor – Anatomy of a Digital Siege