Recent Blog Posts

Lorem Ipsum has been the industry's standard dummy text.

Showing posts from November, 2025Show all
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Why Organizations Are Turning to RPAM
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets
Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist
RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware
JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Why IT Admins Choose Samsung for Mobile Security
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet
⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories
 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform
Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws
Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware
Microsoft Uncovers 'Whisper Leak' Attack That Identifies AI Chat Topics in Encrypted Traffic
Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection