3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics

3 min read
admin
July 21, 2025
A new attack campaign has compromised more than 3,500 websites worldwide with JavaScript cryptocurrency miners, marking the...
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

3 min read
admin
July 20, 2025
The financially motivated threat actor known as EncryptHub (aka LARVA-208 and Water Gamayun) has been attributed to...
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

3 min read
admin
July 20, 2025
A critical security vulnerability in Microsoft SharePoint Server has been weaponized as part of an "active, large-scale"...
admin
July 20, 2025
Cybersecurity researchers have alerted to a supply chain attack that has targeted popular npm packages via a...
admin
July 20, 2025
A newly disclosed critical security flaw in CrushFTP has come under active exploitation in the wild. Assigned...
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

3 min read
admin
July 18, 2025
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that's used by law enforcement...
admin
July 18, 2025
Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster...
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

2 min read
admin
July 18, 2025
Cybersecurity researchers have disclosed details of a new malware called MDifyLoader that has been observed in conjunction...
admin
July 18, 2025
Google on Thursday revealed it's pursuing legal action in New York federal court against 25 unnamed individuals...
admin
July 18, 2025
Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose...
From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

7 min read
admin
July 18, 2025
With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data...
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

4 min read
admin
July 18, 2025
Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute them via Amadey as...
admin
July 17, 2025
Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting Apache HTTP Server...
admin
July 17, 2025
An international operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group known as...
admin
July 17, 2025
The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures that...
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

5 min read
admin
July 17, 2025
The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat...
admin
July 17, 2025
Cisco has disclosed a new maximum-severity security vulnerability impacting Identity Services Engine (ISE) and Cisco ISE Passive...
admin
July 16, 2025
Cybersecurity researchers have disclosed what they say is a "critical design flaw" in delegated Managed Service Accounts...
admin
July 16, 2025
The AI gold rush is on. But without identity-first security, every deployment becomes an open door. Most...
admin
July 16, 2025
Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in...