In a significant escalation of cyber threats, Arctic Wolf Labs has identified a coordinated campaign in which the Russian-aligned RomCom threat group leverages the SocGholish […]
Category: Cyber Security News
Hackers Launch Active Attacks on Telecom and Media Industries
The telecommunications & media sector stands at the epicenter of a relentless cyber onslaught, as evidenced by CYFIRMA’s latest quarterly industry report. Leveraging telemetry-driven intelligence […]
When Your $2M Security Detection Fails: Can your SOC Save You?
Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of defense. Yet […]
HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers
Security researchers at Cato CTRL have uncovered HashJack. This innovative indirect prompt-injection attack hides harmful commands in the fragment portion of URLs after the “#” […]
Hackers Use Fake “Battlefield 6” Hype to Spread Stealers and C2 Malware
The global gaming community is reeling after Bitdefender Labs revealed widespread malware operations exploiting the blockbuster launch of Electronic Arts’ Battlefield 6, a first-person shooter […]
Hackers Trick macOS Users into Running Terminal Commands to Install FlexibleFerret Malware
North Korean-aligned threat actors are leveraging convincing fake job recruitment websites to deceive macOS users into executing malicious Terminal commands that deliver the FlexibleFerret malware, […]
Tor Network Adopts Galois Onion Encryption To Strengthen User Protection
The Tor Project has begun replacing its legacy relay encryption system, known as tor1, with a modern design called Counter Galois Onion (CGO). This upgrade […]
Developers Are Exposing Passwords and API Keys Through Online Code Tools
Security researchers at watchTowr Labs uncovered a massive leak of sensitive credentials after scanning popular online JSON formatting tools. Developers and administrators have been pasting […]
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
Attackers behind the ToddyCat advanced persistent threat (APT) toolkit have adapted to stealing Outlook mail data and Microsoft 365 Access tokens. According to Kaspersky Labs’ […]
Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast, flexible, and easy to work […]