⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors

18 min read
admin
May 5, 2025
What if attackers aren't breaking in—they're already inside, watching, and adapting?
This week showed a sharp rise in...
admin
May 5, 2025
Let’s be honest: if you're one of the first (or the first) security hires at a small...
admin
May 5, 2025
Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple's AirPlay protocol that, if successfully...
admin
May 5, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command...
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

3 min read
admin
May 5, 2025
The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2...
admin
May 3, 2025
Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that...
admin
May 3, 2025
An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical...
admin
May 3, 2025
The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly...
admin
May 2, 2025
Ireland's Data Protection Commission (DPC) on Friday fined popular video-sharing platform TikTok €530 million ($601 million) for...
admin
May 2, 2025
Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows...
admin
May 2, 2025
The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called...
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

2 min read
admin
May 2, 2025
A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big...
admin
May 1, 2025
Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as...
admin
May 1, 2025
Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing...
admin
May 1, 2025
Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an...
admin
May 1, 2025
For over a decade, application security teams have faced a brutal irony: the more advanced the detection...
DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

3 min read
admin
May 1, 2025
Russian companies have been targeted as part of a large-scale phishing campaign that's designed to deliver a...
admin
May 1, 2025
Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure...
admin
May 1, 2025
SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have...
[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats
![[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqbZf4bsDp6ei3fmQ8swm7GB5XoRrhZSFE7ZNhRLFO49KlmdgpIDCZWMSv7rydpEShIrNb9crnH5p6mFZbURzO5HC9I4RlzJazBBw5aHOTmI38sqiZIWPldRqut4bTgegipjOk5VgktVOwCKF_ncLeBX-pMTO_GMVMfbzZbf8eAj21V04y_NiOaSApGkM/s728-rw-e365/webinar-play.jpg)
2 min read
admin
April 30, 2025
How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore.
Today’s attackers don’t...