Fake Cryptocurrency Trading Apps
30
Jul
2025

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Jul 30, 2025Ravie LakshmananCryptocurrency / Browser Security Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency…

AI in IT services and the diminishing correlation between people and growth
30
Jul
2025

Be wary of enterprise software providers’ AI

Financial results analysis by Forrester has found that enterprise software providers are ramping up efforts to sell the idea of…

WordPress
30
Jul
2025

Hackers actively exploit critical RCE in WordPress Alone theme

Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme ‘Alone,’ to achieve remote…

Lazarus Subgroup 'TraderTraitor' Attacking Cloud Platforms and Poisoning Supply Chains
30
Jul
2025

Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains

A sophisticated North Korean cyber espionage operation known as TraderTraitor has emerged as one of the most formidable threats to…

LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits
30
Jul
2025

LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits

Large language model (LLM)-powered honeypots are becoming increasingly complex instruments for luring and examining threat actors in the rapidly changing…

patched Apple
30
Jul
2025

Apple patches multiple vulnerabilities in iOS and iPadOS. Update now!

Apple released a security update for iOS and iPadOS to patch multiple vulnerabilities, including one that could leak sensitive information…

UK flights suspended after air traffic control outage
30
Jul
2025

UK flights suspended after air traffic control outage

The National Air Traffic Services (NATS) organisation responsible for air traffic control services at multiple airports in the UK is…

Hacker being sneaky
30
Jul
2025

Hackers plant 4G Raspberry Pi on bank network in failed ATM heist

The UNC2891 hacking group, also known as LightBasin, used a 4G-equipped Raspberry Pi hidden in a bank’s network to bypass…

5 Email Attacks SOCs Cannot Detect Without A Sandbox 
30
Jul
2025

5 Email Attacks SOCs Cannot Detect Without A Sandbox 

Even with Slack, Teams, and every new communication tool out there, email remains the top attack vector for businesses. Why?…

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media
30
Jul
2025

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media

A sophisticated cyberattack campaign disrupted the Russian IT industry and entities in several other countries, leveraging advanced evasion techniques to…

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
30
Jul
2025

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

Jul 30, 2025Ravie LakshmananEncryption / Ransomware Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims…

M&S cyber attack disruption likely to last until July
30
Jul
2025

Scattered Spider tactics continue to evolve, warn cyber cops

The Scattered Spider hacking collective is still hard at work refining its tactics and deploying new malware variants in the…