News

Cyber Attacks Latest News
News & Articles
Global Cyber Security Vulnerabilities & Threats
-
⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP...
on 10/11/2025
Cyber threats didn’t slow down last week—and attackers are getting smarter. We’re seeing malware hidden in virtual machines, side-channel leaks exposing AI chats, and spyware quietly targeting Android devices […]
-
New Browser Security Report Reveals Emerging Threats for...
on 10/11/2025
According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls like DLP, […]
-
Samsung Mobile Flaw Exploited as Zero-Day to Deploy...
on 07/11/2025
A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a "commercial-grade" Android spyware dubbed LANDFALL in targeted attacks in the Middle East. The activity involved […]
-
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into...
on 07/11/2025
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are […]
-
Vibe-Coded Malicious VS Code Extension Found with Built-In...
on 07/11/2025
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, […]
-
Cisco Warns of New Firewall Attack Exploiting...
on 06/11/2025
Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat […]
-
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI...
on 06/11/2025
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or […]
-
Hackers Weaponize Windows Hyper-V to Hide Linux VM and...
on 06/11/2025
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the […]
-
SonicWall Confirms State-Sponsored Hackers Behind September...
on 06/11/2025
SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. "The malicious activity – […]
-
Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy...
on 05/11/2025
A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding […]
News
Data Breaches
-
Fake 0-Day Exploit Emails Trick Crypto Users...
on 07/11/2025
Bolster AI reveals a new scam using a simple JS code via Emkei's Mailer to fake 37% profits and steal crypto. Act fast […]
-
What Is Cyber Attacking? The Ultimate Guide...
on 27/09/2025
Every 39 seconds, a cyber attack occurs somewhere in the world, causing global damages exceeding $10.5 trillion […]
-
What Does Fickle Mean? Examples and Impact...
on 25/09/2025
“Fickle” describes a tendency to change frequently and unpredictably, often resulting in instability or […]
-
Cybersecurity Degrees in Connecticut: Your...
on 14/09/2025
Did you know that by 2025, cybercrime is expected to cost the world $10.5 trillion annually? With threats rising and […]
-
How to Hide Internet Activity at Work...
on 14/09/2025
In today’s digital-first workplace, employers monitor internet usage more than ever. Whether it’s for […]
Informations
Threat Intelligence
- Sorry, it looks like there are no posts to view!
