Cybersecurity Threats | Malware Types | Social Engineering Attacks Lazarus Group boosts malware tools with PondRAT, ThemeForestRAT, & RemotePE
Cyber Threat Intelligence | Cybersecurity Attacks | Infrastructure Vulnerability North Korean fake job interview schemes
Cybercrime | Malware Distribution | Social Engineering ShadowCaptcha distributing ransomware & cryptominers via compromised WordPress sites
Advanced Persistent Threats | Cybersecurity Threats | Social Engineering Techniques Diplomats targeted by UNC6384 through captive portal hijacking
Cybersecurity Threats | Social Engineering Tactics | Supply Chain Vulnerabilities MixShell malware spreading through US supply chains via contact forms
Malware Delivery Techniques | Phishing Attacks | Remote Access Tools Linux RAR malware bypasses antivirus software
Cybersecurity Threats | Malware Development | Social Engineering Tactics ClickFix & fake CAPTCHAs facilitate CORNFLAKE.V3 deployment
AI Vulnerabilities | Cybersecurity Threats | Social Engineering Techniques AI browsers scammed by PromptFix attacks run malicious hidden prompts
Attack Methodologies | Cyber Threats | Vulnerability Exploitation EncryptHub using Brave Support Platform to weaponise MMC vulnerability
Collaborative Threat Actors | Cybercriminal Tactics | Data Breaches How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands
Cybersecurity Threats | Remote Access Tools | Social Engineering Tactics Exploring the emerging trends in cyber deception threats of 2025, from counterfeit CAPTCHAs to Remote Access Trojans (RATs).
Cybersecurity Threats | Help Desk Vulnerabilities | Social Engineering Attacks Help Desks in jeopardy: Scattered Spider highlights an often ignored threat.
Cybercrime | Data Breach | Tax Fraud A hacker has been extradited to the United States for his involvement in tax fraud schemes that resulted in the theft of more than $2.5 million.
Email Security Exploitation | Social Engineering Techniques | Spear Phishing Microsoft 365’s Direct Send feature has been exploited to circumvent email security measures.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Credential Harvesting | Remote Access Tools | Social Engineering Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.
AI-Enhanced Tactics | Government Impersonation | Phishing Operations Threat actors are using Generative AI to carry out phishing attacks by impersonating government websites.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.
Cybersecurity Threats | Phishing and Social Engineering Techniques | Remote Monitoring and Management Exploitation Threat actors are exploiting Remote Monitoring and Management (RMM) tools to gain control of systems and extract sensitive information.
Cybercriminal Tactics | Ransomware Evolution | Social Engineering Techniques Profile of the Scattered Spider Threat Actor – Recent Strategies, Methods, Practices, and Indicators of Compromise.
Evasion Techniques | Malware Propagation Methods | Social Engineering Tactics The ClickFix malware campaign takes advantage of CAPTCHAs to facilitate cross-platform infection spread.
Cybersecurity Incident | Data Breach | Social Engineering Cisco Experienced a Security Breach – Cybercriminals Obtained User Profile Information from Cisco.com
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Customer Data Protection | Cybersecurity Breaches | Social Engineering Attacks Chanel, a leading fashion brand, has been targeted in a series of cyberattacks linked to vulnerabilities in Salesforce.