Cyberattack Techniques | Fileless Malware | Remote Access Trojans AsyncRAT Takes Advantage of ConnectWise ScreenConnect to Capture Credentials and Cryptocurrency
Hiring Fraud | Identity Deception | Remote Work Vulnerabilities Remote hiring fraud increasing quickly
macOS Security Threats | Malware Campaigns | Phishing Attacks Hidden SVG files launch base64-encoded phishing sites
Espionage Activities | Malware Delivery | Phishing Campaigns ScarCruft’s “Operation HanKook Phantom” targeting South Korean academics with RokRAT malware
Cybersecurity Threats | Phishing Techniques | State-Sponsored Hacking Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication
Android Banking Trojans | Malware Evolution | Ransomware Tactics HOOK Android Trojan incorporates ransomware overlays & 107 remote commands
Malware Distribution | Phishing Campaigns | Remote Access Tools Phishing Attack Employs UpCrypter in Fraudulent Voicemail Emails to Distribute RAT Payloads.
Cybersecurity Threats | Social Engineering Tactics | Supply Chain Vulnerabilities MixShell malware spreading through US supply chains via contact forms
Attacks on Managed Service Providers (MSPs) | Exploitation of Collaboration Tools | Ransomware Threats AI boosts ransomware impacts
Malware Delivery Techniques | Phishing Attacks | Remote Access Tools Linux RAR malware bypasses antivirus software
Cybersecurity Threats | Malware Delivery Techniques | Phishing Tactics QuirkyLoader distributes Agent Tesla, AsyncRAT, Snake Keylogger and other malware
AI Vulnerabilities | Cybersecurity Threats | Social Engineering Techniques AI browsers scammed by PromptFix attacks run malicious hidden prompts
Human-Centric Cybersecurity | Incident Response Enhancement | Phishing Threat Detection Cofense Vision 3.0 detects how users interact with phishing messages
AI-Powered Phishing Techniques | Deepfake Technology in Cybercrime | Evasion Tactics Using Legitimate Services Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Financial Fraud Techniques | Generative AI in Cybercrime | Phishing Campaigns AI technologies utilised for Brazilian phishing scam
Credential Leaks | Cybersecurity Threats | Malicious Exploitation Leaked Credentials Increase by 160%: Exploits Utilized by Attackers
Cybersecurity Threats | Malware Distribution Methods | Phishing Techniques Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Browser-Based Attacks | Cross-Platform Threats | Malware Campaigns CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware
AI-Powered Investigations | Cybersecurity | Identity Threat Protection SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.
Ad Fraud | Malicious Apps | Subscription Scams Fraudulent VPN and spam blocking applications associated with VexTrio are being utilized for advertisement deception and subscription scams.
AI-Enhanced Tactics | Government Impersonation | Phishing Operations Threat actors are using Generative AI to carry out phishing attacks by impersonating government websites.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.
Cybersecurity Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.
Cybercriminal Tactics | Ransomware Evolution | Social Engineering Techniques Profile of the Scattered Spider Threat Actor – Recent Strategies, Methods, Practices, and Indicators of Compromise.
Cybercrime | E-commerce Security | Phishing Attacks Over 10,000 harmful TikTok Shop websites are targeting users to obtain login details and distribute malware.
Evasion Techniques | Malware Propagation Methods | Social Engineering Tactics The ClickFix malware campaign takes advantage of CAPTCHAs to facilitate cross-platform infection spread.
Credential Theft | Cybersecurity Threats | Phishing Campaign APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information