Scammers Compromised by Own Malware, Expose $4.67M Operation
16
Aug
2025

Scammers Compromised by Own Malware, Expose $4.67M Operation

CloudSEK uncovered a Pakistan-based family cybercrime network that spread infostealers via pirated software, netting $4.67M and millions of victims. The…

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
16
Aug
2025

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure

Aug 16, 2025Ravie LakshmananAndroid / Malware Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC…

Russia Is Cracking Down on End-to-End Encrypted Calls
16
Aug
2025

Russia Is Cracking Down on End-to-End Encrypted Calls

WIRED copublished an investigation this week with The Markup and CalMatters showing that dozens of data brokers have been hiding…

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks
16
Aug
2025

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Cisco Talos researchers have uncovered a sophisticated Chinese-speaking advanced persistent threat (APT) group, designated UAT-7237, that has been actively targeting…

EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
16
Aug
2025

EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw

EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw Pierluigi Paganini August 16, 2025 EncryptHub actor exploits Windows…

China-linked group Fire Ant exploits VMware and F5 flaws since early 2025
16
Aug
2025

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset Pierluigi Paganini August 16, 2025 APT group UAT-7237, linked to…

Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256)
16
Aug
2025

Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256)

Cybersecurity researchers from watchTowr Labs have published a comprehensive technical analysis of a critical pre-authentication command injection vulnerability affecting Fortinet…

EncryptHub Exploits MSC EvilTwin Vulnerability
16
Aug
2025

Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware

Aug 16, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw…

16
Aug
2025

Our 20,000 Eyes and Hands

Here’s a different way to think about the change coming to the workforce and economy from AI. Imagine everyone in…

Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
16
Aug
2025

Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst

Palo Alto Networks has published an extensive malware analysis tutorial detailing the dissection of a sophisticated .NET-based threat that delivers…

Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection
16
Aug
2025

Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection

The cybersecurity landscape faces a new sophisticated threat as the Crypto24 ransomware group demonstrates an alarming evolution in attack methodology,…

Ransomware attacks by month July 2025
15
Aug
2025

Qilin Remains Top Ransomware Group As Attacks Rise

Qilin continues to stake a claim as the top ransomware group in the wake of the decline of RansomHub earlier…