Shift in state relationship: The Russian government has reportedly moved to active management of domestic cybercriminals, employing selective enforcement to reinforce state authority. Fracturing underground:…
Coordinated campaign: Hackers’ coordinated campaign involves domain squatting, fraudulent mobile apps, and malvertising. Widespread impersonation: At least 13 domains and multiple fraudulent mobile applications on…
Network Insights: Displays real-time VPN speeds, data use, and status on iOS Lock Screen. Secure Device Assistant: Runs privacy health checks, ensuring updates and protections…
Rapid evolution: Coldriver developed and deployed three new malware strains within five days of its previous tool, LostKeys, being publicly exposed. New malware suite: The…
Significant increase: Ransomware attacks targeting critical industries have surged by 34% year-over-year in the first nine months of 2025. Widespread impact: Globally, almost 5,000 ransomware…
Advanced evasion: A new malware loader uses LSB steganography to conceal malicious .NET payloads within image files hosted on legitimate platforms. Brazilian origin: A Brazilian…
Feature exploitation: Threat actors exploit the trusted M365 email pathway, designed for unauthenticated devices like printers, to bypass security checks and launch attacks. Bypassed authentication:…
Deceptive email: A new phishing campaign is impersonating Home Depot with a Halloween-themed giveaway. Advanced evasion tactics: The attack sends emails from a compromised high…
Sophisticated implants: The campaign utilizes previously unknown APT implants, including a custom C++ modular backdoor and a .NET implant Targeted sectors: Infections have been identified…
Extensive intrusion: Cybersecurity firm F5 suffered a digital intrusion lasting over a year, resulting in the theft of source code and sensitive vulnerability information. High-profile…
Service restoration: AWS returned to normal operations following a major outage, though some backlogs are still being processed. Root cause confirmed: The disruption was caused…
Jessica Hunter — Government of Australia The Australian Government has appointed Jessica Hunter as Ambassador for Cyber Affairs and Critical Technology. A veteran of the…
Coordinated attacks: At least two hacktivist groups have claimed responsibility for launching DDoS attacks against multiple high-profile Indian websites. Government and education: These include critical…
Massive impact: A significant AWS outage caused widespread disruptions for numerous popular online services, with at least 7,000 reports. Root cause: The issue was traced…
Mass repatriation: Cambodia repatriated 64 South Korean nationals under investigation for their alleged involvement in large-scale online scam operations. Detention requests: South Korean police have…
Cyber espionage allegations: China's State Security Ministry has accused the U.S. NSA of conducting a prolonged cyberattack operation. Critical infrastructure target: The facility maintains and…
The weekly news underscored how fast risk is evolving across breaches, phishing ecosystems, and software supply chains. Leaders urged action rather than waiting and watching. …
Expanding operations: A threat actor has expanded its operations from China to Taiwan, Japan, and most recently, Malaysia, using evolving malware delivery tactics. Primary malware:…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: