Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
20
Jun
2025

Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware

A malicious campaign tracked as Mocha Manakin has been identified employing the deceptive “paste-and-run” technique to trick unsuspecting users into…

Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
20
Jun
2025

Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection

A severe security vulnerability in the Insomnia API Client, a widely used tool by developers and security testers for interacting…

Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware
20
Jun
2025

Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware

CyberArmor has uncovered a sophisticated phishing campaign exploiting Vercel, a widely used frontend hosting platform, to distribute a malicious variant…

Dark Partners cybercrime gang fuels large-scale crypto heists
20
Jun
2025

BitoPro exchange links Lazarus hackers to $11 million crypto heist

The Taiwanese cryptocurrency exchange BitoPro claims the North Korean hacking group Lazarus is behind a cyberattack that led to the…

PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
20
Jun
2025

PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection

A recent threat hunting session has revealed a sophisticated PowerShell script, named y1.ps1, hosted in an open directory on a…

New Cyber Detection Method Uses Hackers’ Own Jitter Patterns Against Them
20
Jun
2025

New Cyber Detection Method Uses Hackers’ Own Jitter Patterns Against Them

Cybersecurity experts at Varonis Threat Labs have identified a clever new way to spot hidden cyberattacks, even those used by…

Qilin Ransomware Adds "Call Lawyer" Feature to Pressure Victims for Larger Ransoms
20
Jun
2025

Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms

The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure…

Election workers’ data stolen in cyber breach of Oxford City Council
20
Jun
2025

Election workers’ data stolen in cyber breach of Oxford City Council

Oxford City Council election workers from 2001 to 2022 had personal information accessed by hackers in an attack over the…

OneDrive
20
Jun
2025

Microsoft investigates OneDrive bug that breaks file search

​Microsoft is investigating a known OneDrive issue that is causing searches to appear blank for some users or return no…

Cyber Essentials certifications rising slowly but steadily
20
Jun
2025

Cyber Essentials certifications rising slowly but steadily

The number of Cyber Essentials badges issued via the National Cyber Security Centre (NCSC) backed security certification scheme continues to…

Cloudflare
20
Jun
2025

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider

Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps,…

Hackers Use Social Engineering to Target Expert on Russian Operations
20
Jun
2025

Hackers Use Social Engineering to Target Expert on Russian Operations

A new and highly sophisticated cyberattack, believed to be from a Russian state-linked group, has been revealed. This innovative method…