Recent
Hacker Manipulating Others

Shift in state relationship: The Russian government has reportedly moved to active management of domestic cybercriminals, employing selective enforcement to reinforce state authority. Fracturing underground:…

|
Published
Laptop - Comet - Browser - Download - Fake Alert

Coordinated campaign: Hackers’ coordinated campaign involves domain squatting, fraudulent mobile apps, and malvertising. Widespread impersonation: At least 13 domains and multiple fraudulent mobile applications on…

|
Published
Office - Employees - Phoenix - Laptop - Email

Targeted espionage: MuddyWater APT is conducting a sophisticated phishing campaign targeting international organizations for foreign intelligence gathering. Compromised accounts: Hackers utilize compromised email accounts, accessed…

|
Published

Network Insights: Displays real-time VPN speeds, data use, and status on iOS Lock Screen. Secure Device Assistant: Runs privacy health checks, ensuring updates and protections…

|
Published
Surfshark Launches a Household-Focused Web Content Blocker

Feature Launch: Surfshark unveils a category-based web content blocker for safer shared online experiences. Key Function: Lets users block content types across devices, secured with…

|
Published
Hacker - Laptop

Rapid evolution: Coldriver developed and deployed three new malware strains within five days of its previous tool, LostKeys, being publicly exposed. New malware suite: The…

|
Published
World Map - Manufacturing - Healthcare - Energy

Significant increase: Ransomware attacks targeting critical industries have surged by 34% year-over-year in the first nine months of 2025. Widespread impact: Globally, almost 5,000 ransomware…

|
Published
Image - Malware Bug - World Map

Advanced evasion: A new malware loader uses LSB steganography to conceal malicious .NET payloads within image files hosted on legitimate platforms. Brazilian origin: A Brazilian…

|
Published
Microsoft 365 - Cloud - Direct Send - Printer

Feature exploitation: Threat actors exploit the trusted M365 email pathway, designed for unauthenticated devices like printers, to bypass security checks and launch attacks. Bypassed authentication:…

|
Published
Phishing Email

Deceptive email: A new phishing campaign is impersonating Home Depot with a Halloween-themed giveaway. Advanced evasion tactics: The attack sends emails from a compromised high…

|
Published
Espionage Map Binoculars

Sophisticated implants: The campaign utilizes previously unknown APT implants, including a custom C++ modular backdoor and a .NET implant Targeted sectors: Infections have been identified…

|
Published
F5 Logo

Extensive intrusion: Cybersecurity firm F5 suffered a digital intrusion lasting over a year, resulting in the theft of source code and sensitive vulnerability information. High-profile…

|
Published
AWS Logo

Service restoration: AWS returned to normal operations following a major outage, though some backlogs are still being processed. Root cause confirmed: The disruption was caused…

|
Published
October 20

Jessica Hunter — Government of Australia The Australian Government has appointed Jessica Hunter as Ambassador for Cyber Affairs and Critical Technology. A veteran of the…

|
Published on October 20, 2025
DDoS

Coordinated attacks: At least two hacktivist groups have claimed responsibility for launching DDoS attacks against multiple high-profile Indian websites. Government and education: These include critical…

|
Published on October 20, 2025
AWS - Outage

Massive impact: A significant AWS outage caused widespread disruptions for numerous popular online services, with at least 7,000 reports. Root cause: The issue was traced…

|
Published on October 20, 2025
Police - Hacker - Arrest - Handcuffs

Mass repatriation: Cambodia repatriated 64 South Korean nationals under investigation for their alleged involvement in large-scale online scam operations. Detention requests: South Korean police have…

|
Published on October 20, 2025
US China trade wars

Cyber espionage allegations: China's State Security Ministry has accused the U.S. NSA of conducting a prolonged cyberattack operation. Critical infrastructure target: The facility maintains and…

|
Published on October 20, 2025
Map - Control Room - Data Breaches - Email

The weekly news underscored how fast risk is evolving across breaches, phishing ecosystems, and software supply chains. Leaders urged action rather than waiting and watching. …

|
Published on October 18, 2025
Phishing Email - HoldingHands - China - Japan Maps

Expanding operations: A threat actor has expanded its operations from China to Taiwan, Japan, and most recently, Malaysia, using evolving malware delivery tactics. Primary malware:…

|
Published on October 17, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: