Recent Blog Posts

Lorem Ipsum has been the industry's standard dummy text.

Showing posts from December, 2025Show all
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass
U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware
CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
âš¡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition
Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme
âš¡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware
Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution
How to Order VPN with Dedicated IP
ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories
APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
The Impact of Robotic Process Automation (RPA) on Identity and Access Management
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware
Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
âš¡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More