New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users
18
Jul
2025

New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users

Cybercriminals are now leveraging seemingly innocuous voicemail notifications to distribute malware, with a recent campaign impersonating Veeam Software to exploit…

China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
18
Jul
2025

China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

Jul 18, 2025Ravie LakshmananSurveillance / Mobile Security Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s…

Windows 11
18
Jul
2025

Microsoft mistakenly tags Windows Firewall error log bug as fixed

Microsoft has mistakenly tagged an ongoing Windows Firewall error message bug as fixed in recent updates, stating that they are…

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets
18
Jul
2025

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets

Infostealers are specialized malware variants that routinely steal large amounts of sensitive data from compromised systems. This includes session tokens,…

Russian alcohol retailer WineLab closes stores after ransomware attack
18
Jul
2025

Russian alcohol retailer WineLab closes stores after ransomware attack

WineLab, the retail store of the largest alcohol company in Russia, has closed its stores following a cyberattack that is…

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
18
Jul
2025

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools

Fancy Bear, designated as APT28 by cybersecurity experts, represents a sophisticated Russian cyberespionage collective operational since 2007, renowned for infiltrating…

New Wave of Crypto-Hijacking Infects 3,500+ Websites
18
Jul
2025

New Wave of Crypto-Hijacking Infects 3,500+ Websites

A stealth Monero-mining campaign has quietly compromised more than 3,500 websites by embedding an innocuous-looking JavaScript file called karma.js. The…

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials
18
Jul
2025

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials

Threat actors have been using a sophisticated phishing operation to impersonate Turkish Aerospace Industries (TUSAŞ) in order to attack Turkish…

PoisonSeed Tricking Users Into Bypassing FIDO Keys With QR Codes
18
Jul
2025

PoisonSeed Tricking Users Into Bypassing FIDO Keys With QR Codes

Security researchers at Expel have detailed a new phishing technique that sidesteps the protection offered by physical FIDO (Fast Identity…

Russian Vodka Producer Beluga Hit by Ransomware Attack
18
Jul
2025

Russian Vodka Producer Beluga Hit by Ransomware Attack

Russian premium vodka producer Beluga, owned by NovaBev Group, has fallen victim to a sophisticated ransomware attack that disrupted its…

Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer
18
Jul
2025

Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer

Attackers are increasingly leveraging the ClickFix social engineering technique to distribute potent malware families, including NetSupport RAT, Latrodectus, and Lumma…

Meta logo
18
Jul
2025

Meta execs pay the pain away with $8 billion privacy settlement

Meta chief Mark Zuckerberg and several other members of the social media giant’s top brass agreed to settle increasingly heated…