‘HoldingHands’ Acts Like a Pickpocket With Taiwan Orgs

Since at least January, the threat actor has been employing…

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor

A now-patched security flaw in Google Chrome was exploited as…

New Sorillus RAT Targets European Organizations Through Tunneling Services

An important development discovered in March 2025 by Orange Cyberdefense’s…

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data

The Acronis Threat Research Unit has identified new variants of…

New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper

The two new variants of the KimJongRAT stealer have emerged,…

U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network

The U.S. Department of Justice (DoJ) said it has filed…

PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks

A malicious campaign dubbed PoisonSeed is leveraging compromised credentials associated…

Organizations Lack Incident Response Plans, But Answers Are on the Way

Developing strong incident response plans remains an area that requires…

Hackers Allegedly Selling 3.17 Million Records of Honda Cars India Customers

A hacker operating under the pseudonym “Empire” has allegedly listed…

The CISO cloud security conundrum: Buy vs. build vs. both

Cloud security isn’t just about finding risks — it’s about…

Krispy Kreme Cyberattack: A Sweet Disruption

Last week, Krispy Kreme was in a sticky situation as the beloved doughnut chain experienced a significant cyberattack that disrupted its online operations. The incident, […]