admin
December 1, 2025
A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a...
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
4 min read
admin
December 1, 2025
The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and...
admin
November 30, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to...
admin
November 28, 2025
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for...
admin
November 28, 2025
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry...
admin
November 28, 2025
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based...
admin
November 28, 2025
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender...
admin
November 27, 2025
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has...
admin
November 27, 2025
Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection...
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
14 min read
admin
November 27, 2025
Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering...
admin
November 27, 2025
Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously...
admin
November 26, 2025
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after...
admin
November 26, 2025
Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard...
admin
November 26, 2025
South Korea's financial sector has been targeted by what has been described as a sophisticated supply chain...
admin
November 26, 2025
Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that's capable of injecting...
admin
November 26, 2025
If you're using community tools like Chocolatey or Winget to keep systems updated, you're not alone. These...
admin
November 26, 2025
The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via...
admin
November 26, 2025
The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an...
admin
November 25, 2025
The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate...
admin
November 25, 2025
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are...
