Category: CyberSecurityNews

Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers
12
Sep
2025

Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers

Microsoft to enhance security for its Teams platform by automatically warning users about malicious links in chat messages. The new…

Conversation with Amazon’s Senior Software Development Engineer Naman Jain
11
Sep
2025

Conversation with Amazon’s Senior Software Development Engineer Naman Jain

To ensure the security of sensitive internet data, it takes more than encryption; it requires clear principles, careful design, and…

kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
11
Sep
2025

kkRAT Employs Network Communication Protocol to Steal Clipboard Contents

In early May 2025, cybersecurity researchers began tracking a novel Remote Access Trojan (RAT) targeting Chinese-speaking users via phishing sites…

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media
11
Sep
2025

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media

Four Kenyan filmmakers became victims of sophisticated surveillance when FlexiSPY spyware was covertly installed on their devices while in police…

Lessons From Salesforce/Salesloft Drift Data Breaches
11
Sep
2025

Lessons From Salesforce/Salesloft Drift Data Breaches

The Salesloft Drift data breaches of August 2025 stand as one of the most significant supply chain attacks in SaaS…

New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs
11
Sep
2025

New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs

A novel speculative execution attack named VMSCAPE allows a malicious virtual machine (VM) to breach its security boundaries and steal…

What You Need to Pay Attention to Right Now 
11
Sep
2025

What You Need to Pay Attention to Right Now 

Cyber attackers constantly refine their evasion methods. That’s what makes threats, including phishing, increasingly hard to detect and investigate. Kits…

Threat Actors Leveraging Open-Source AdaptixC2 in Real-world Attacks
11
Sep
2025

Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks

In early May 2025, security teams began observing a sudden rise in post-exploitation activity leveraging an open-source command-and-control framework known…

L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks
11
Sep
2025

L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks

In early March 2025, security teams first observed an unprecedented L7 DDoS botnet targeting web applications across multiple sectors. The…

New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads
11
Sep
2025

New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads

A previously unknown advanced persistent threat (APT) group has unleashed a new fileless malware framework, dubbed EggStreme, in a highly…

Cornwell Quality Tools Data Breach
11
Sep
2025

Cornwell Quality Tools Data Breach

Cornwell Quality Tools has disclosed a significant data breach that compromised the sensitive information of nearly 104,000 individuals. The incident…

ChillyHell macOS Malware Profiles Compromised Machines and Maintain Persistence with 3 Methods
11
Sep
2025

ChillyHell macOS Malware Profiles Compromised Machines and Maintain Persistence with 3 Methods

ChillyHell first surfaced on public malware repositories in early May 2025, although its developer-signed notarization dates back to 2021. This…