DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats
21
Jun
2025

DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats

DuckDuckGo has significantly upgraded its Scam Blocker feature to protect users against a broader range of digital threats, including sham…

How Smart Timesheet Software Is Changing the Way of Work
21
Jun
2025

How Smart Timesheet Software Is Changing the Way of Work

As an employee have been managing projects in remote, hybrid, and traditional work environments, employees have always faced the same…

Scattered Spider Cyberattacks
21
Jun
2025

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

Jun 21, 2025Ravie LakshmananCyber Attack / Critical Infrastructure The April 2025 cyber attacks targeting U.K. retailers Marks & Spencer and…

Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware
21
Jun
2025

Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware

Cybercriminals have discovered a sophisticated new method to distribute malicious remote access tools by exploiting Vercel, a legitimate frontend hosting…

Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection
21
Jun
2025

Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection

A severe security vulnerability has been discovered in the widely-used Insomnia API Client that allows attackers to execute arbitrary code…

Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware
21
Jun
2025

Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware

A sophisticated malware campaign targeting ComfyUI, a popular AI image generation framework, has successfully compromised at least 695 servers worldwide,…

Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number
21
Jun
2025

Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number

In a concerning development for internet users, cybercriminals have devised a sophisticated new technique to manipulate Google search results, effectively…

Godfather Android trojan uses virtualization to hijack banking and crypto apps
21
Jun
2025

Godfather Android trojan uses virtualization to hijack banking and crypto apps

Godfather Android trojan uses virtualization to hijack banking and crypto apps Pierluigi Paganini June 21, 2025 Godfather Android trojan uses…

Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
21
Jun
2025

Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads

A sophisticated new threat actor known as Mocha Manakin has emerged in the cybersecurity landscape, employing an increasingly popular social…

Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds
21
Jun
2025

Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds

The largest distributed denial-of-service (DDoS) attack ever documented was successfully stopped by Cloudflare in mid-May 2025, with attackers unleashing a…

Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT
21
Jun
2025

Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT

Cybersecurity professionals across East and Southeast Asia are facing a sophisticated new threat as China-linked attackers deploy a weaponized MSI…

Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank
21
Jun
2025

Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank

Summary 1. A OneDrive bug is causing some users’ search results to appear blank, though files are still accessible. 2….