Category: CyberSecurityNews

Threat Actors Abuse Proofpoint's and Intermedia’s Link Wrapping Features to Hide Phishing Payloads
01
Aug
2025

Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads

The latest wave of credential-phishing campaigns has revealed an unexpectedly convenient ally for threat actors: the very e-mail security suites…

ChatGPT Conversations are Being Indexed by Search Engines!
01
Aug
2025

ChatGPT Conversations are Being Indexed by Search Engines!

ChatGPT shared conversations are being indexed by major search engines, effectively turning private exchanges into publicly discoverable content accessible to…

Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
01
Aug
2025

Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

A sophisticated attack technique was uncovered where cybercriminals exploit free trials of Endpoint Detection and Response (EDR) software to disable…

First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account
01
Aug
2025

First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account

The cybersecurity landscape has witnessed a groundbreaking and concerning development with the emergence of LAMEHUG, the first publicly documented malware…

Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware
01
Aug
2025

Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware

A sophisticated malware campaign has emerged targeting unsuspecting users through weaponized versions of popular online tools, particularly Google Translate interfaces….

Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
01
Aug
2025

Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity

Palo Alto Networks’ Unit 42 threat research team has introduced a groundbreaking systematic approach to threat actor attribution, addressing longstanding…

Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations
01
Aug
2025

Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations

A sophisticated cyber campaign leveraging legitimate Remote Monitoring and Management (RMM) tools has emerged as a significant threat to European…

Navigating APTs - Singapore’s Cautious Response to State-Linked Cyber Attacks
01
Aug
2025

Navigating APTs – Singapore’s Cautious Response to State-Linked Cyber Attacks

Singapore’s cybersecurity landscape faced a significant challenge in July 2025 when Coordinating Minister K. Shanmugam disclosed that the nation was…

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials
01
Aug
2025

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

A sophisticated new ransomware threat has emerged from the cybercriminal underground, targeting both Android and Windows platforms with dual capabilities…

New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials
01
Aug
2025

New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials

A sophisticated new banking trojan dubbed DoubleTrouble has emerged as a significant threat to mobile users across Europe, employing advanced…

NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets
01
Aug
2025

NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets

A sophisticated new threat has emerged in the cybercriminal landscape, masquerading as an educational tool while orchestrating large-scale credential theft…

Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools
01
Aug
2025

Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools

Chinese state-sponsored hackers associated with the notorious Silk Typhoon group have filed over ten patents for sophisticated cyber espionage tools,…