Cybersecurity Threats | Data Exfiltration Techniques | Malware Analysis ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure
Advanced Persistent Threats | Cybersecurity Threats | Malware Techniques Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools
Bandwidth Theft | Cybersecurity Threats | Malware Distribution Malicious actors exploiting video download site to distribute Proxyware malware
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Account Compromise Methods | Cybersecurity Threats | Institutional Trust Exploitation Hacked police and government emails for sale: $40 ono
Cybersecurity Threats | Malware Distribution | Software Exploitation SmartLoader malware spread through GitHub repositories
Command-and-Control Frameworks | Cybersecurity Threats | Malware Analysis Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS
Cybersecurity Threats | DDoS Attacks | HTTP/2 Vulnerabilities MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Cybersecurity Threats | Open Source Vulnerabilities | Software Supply Chain Risks Investigators have identified XZ Utils backdoor embedded in Docker Hub images
Brute-Force Attacks | Cybersecurity Threats | Vulnerability Exploitation Global brute-force attack targeting Fortinet SSL VPNs
Cybersecurity Threats | Leadership and Preparedness | Supply Chain Vulnerabilities Despite increases in breaches and budgets, the safety of healthcare systems has not improved.
Cybersecurity Threats | Remote Access Tools | Social Engineering Tactics Exploring the emerging trends in cyber deception threats of 2025, from counterfeit CAPTCHAs to Remote Access Trojans (RATs).
Cybersecurity Threats | Help Desk Vulnerabilities | Social Engineering Attacks Help Desks in jeopardy: Scattered Spider highlights an often ignored threat.
Credential Leaks | Cybersecurity Threats | Malicious Exploitation Leaked Credentials Increase by 160%: Exploits Utilized by Attackers
Cryptocurrency Theft | Cybersecurity Threats | Malicious Browser Extensions GreedyBear has swindled $1 million in cryptocurrency by employing over 150 harmful Firefox wallet extensions.
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks Cybercriminals are utilizing legitimate drivers to disable antivirus programs and weaken the security measures of a system.
Cybersecurity Threats | Malware Evasion Techniques | Ransomware Deployment Strategies HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.
Bug Bounty Programs | Cybersecurity Threats | HTTP Vulnerabilities Recent HTTP request smuggling attacks have affected content delivery networks (CDNs), large organizations, and millions of websites.
AI Exploitation Techniques | Cybersecurity Threats | Smart Home Vulnerabilities Gemini compromised through a prompt injection in a Google Calendar invitation
Cybersecurity Threats | Malware Distribution Methods | Phishing Techniques Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.
Cybersecurity Threats | Malicious Software | Supply Chain Attacks WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.
Command and Control Techniques | Cybersecurity Threats | Web Conferencing Exploits Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.
Cybersecurity Threats | Malware Development | Ransomware Evolution The ScarCruft hacker group has initiated a new malware campaign that utilizes Rust programming language and the PubNub service.
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.
Cybersecurity Threats | Ethereum Scams | Smart Contract Obfuscation Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.