ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
12 min read
admin
October 9, 2025
Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation...
admin
October 9, 2025
Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level...
admin
October 9, 2025
Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes...
admin
October 8, 2025
Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections...
admin
October 8, 2025
Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into...
admin
October 8, 2025
Every year, weak passwords lead to millions in losses — and many of those breaches could have...
admin
October 8, 2025
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP)...
admin
October 8, 2025
Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. Cybercriminals are using AI-powered tools to...
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
5 min read
admin
October 8, 2025
OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool...
admin
October 8, 2025
A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering...
admin
October 7, 2025
Google's DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called CodeMender that automatically detects, patches,...
admin
October 7, 2025
For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye...
admin
October 7, 2025
Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting...
admin
October 7, 2025
Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result...
admin
October 7, 2025
Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical...
admin
October 7, 2025
CrowdStrike on Monday said it's attributing the exploitation of a recently disclosed security flaw in Oracle E-Business...
admin
October 6, 2025
The cyber world never hits pause, and staying alert matters more than ever. Every week brings new...
admin
October 6, 2025
In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security...
admin
October 6, 2025
A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to...
admin
October 6, 2025
A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in...
