Category: CyberSecurityNews

New SheByte PaaS Offering $199 Subscription for Cyber Criminals
19
Apr
2025

New SheByte PaaS Offering $199 Subscription for Cyber Criminals

In the wake of LabHost’s shutdown in April 2024, a new player has emerged in the Phishing-as-a-Service (PhaaS) landscape, positioning…

New Gorilla Android Malware Intercept SMS Messages to Steal OTPs
19
Apr
2025

New Gorilla Android Malware Intercept SMS Messages to Steal OTPs

A sophisticated new Android malware strain called “Gorilla” has emerged in the cybersecurity landscape, specifically designed to intercept SMS messages…

State Sponsored Hackers Now Widely Using ClickFix Attack Technique in Espionage Campaigns
19
Apr
2025

State Sponsored Hackers Now Widely Using ClickFix Attack Technique in Espionage Campaigns

Security researchers have identified a concerning trend in the cyber threat landscape as state-sponsored hackers from multiple countries have begun…

New Limitations Placed on DOGE's Access to Private Social Security Information
19
Apr
2025

New Limitations Placed on DOGE’s Access to Private Social Security Information

A federal judge has issued a preliminary injunction that significantly limits the Department of Government Efficiency’s (DOGE) access to sensitive…

How Companies Can Safeguard Against the Next Wave of Ransomware
19
Apr
2025

How Companies Can Safeguard Against the Next Wave of Ransomware

Ransomware is not retreating it’s evolving. Once a niche cybercrime, ransomware has become a multibillion-dollar global threat that disrupts hospitals,…

Microsoft Warns of Ransomware Exploiting Cloud Environments with New Techniques
19
Apr
2025

Microsoft Warns of Ransomware Exploiting Cloud Environments with New Techniques

Microsoft has issued an alert regarding sophisticated ransomware attacks targeting hybrid cloud environments in Q1 2025. These attacks exploit vulnerabilities…

Hackers Actively Exploiting Critical Exchange & SharePoint Server Vulnerabilities
19
Apr
2025

Hackers Actively Exploiting Critical Exchange & SharePoint Server Vulnerabilities

Microsoft has warned organizations worldwide that threat actors are ramping up their exploitation of critical vulnerabilities in on-premises Exchange Server…

Detecting And Responding To New Nation-State Persistence Techniques
19
Apr
2025

Detecting And Responding To New Nation-State Persistence Techniques

Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated persistence techniques to maintain long-term…

How To Prioritize Threat Intelligence Alerts In A High-Volume SOC
19
Apr
2025

How To Prioritize Threat Intelligence Alerts In A High-Volume SOC

In today’s rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge: efficiently managing and prioritizing the…

How to Implementing SOAR To Reduce Incident Response Time Effectively
19
Apr
2025

How to Implementing SOAR To Reduce Incident Response Time Effectively

In the modern digital landscape, organizations are constantly challenged by an ever-increasing volume of security alerts, sophisticated cyber threats, and…

Over 6 Million Chrome Extensions Can Execute Remote Commands on Users’ Browsers
18
Apr
2025

Over 6 Million Chrome Extensions Can Execute Remote Commands on Users’ Browsers

A major security incident has come to light involving more than six million installations of Chrome browser extensions that secretly…

Beware! Android Spyware 'SpyMax' Gain Total Control of Your Android Phone
18
Apr
2025

Beware! Android Spyware ‘SpyMax’ Gain Total Control of Your Android Phone

A sophisticated Android spyware campaign has been uncovered, disguising itself as the official application of the Chinese Prosecutor’s Office (检察院)….