RansomHub using FakeUpdates scheme to attack government sector
18
Mar
2025

RansomHub using FakeUpdates scheme to attack government sector

RansomHub cyber threat actors have found a new way to deploy their ransomware, and they’re using it to target U.S. government…

DocSwap Malware as Security Document Viewer Attacking Android Users Worldwide
18
Mar
2025

DocSwap Malware as Security Document Viewer Attacking Android Users Worldwide

A sophisticated malware campaign dubbed “DocSwap” has emerged targeting Android users globally by disguising itself as a legitimate document security…

Details of Sophisticated Multi-Stage Attack Uncovered
18
Mar
2025

Details of Sophisticated Multi-Stage Attack Uncovered

The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This…

Windows Zero-Day Flaw
18
Mar
2025

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored…

Google acquires Wiz for $32 billion
18
Mar
2025

Google acquires Wiz for $32 billion

Google announced Tuesday it will acquire cloud security firm Wiz for $32 billion. The move pairs Google — among the…

Blockchain
18
Mar
2025

Blockchain gaming platform WEMIX hacked to steal $6.1 million

Blockchain gaming platform WEMIX suffered a cyberattack last month, allowing threat actors to steal 8,654,860 WEMIX tokens, valued at approximately…

Microsoft Warns of New StilachiRAT Stealing Remote Desktop Protocol Sessions Data
18
Mar
2025

Microsoft Warns of New StilachiRAT Stealing Remote Desktop Protocol Sessions Data

Microsoft has issued an urgent security advisory regarding a newly discovered malware strain called StilachiRAT, which specifically targets and exfiltrates…

How can Organizations Secure Low-Code No-Code Development
18
Mar
2025

How can Organizations Secure Low-Code No-Code Development

Applications developed by citizen developers are on the rise. Low-code and no-code (LCNC) platforms are reshaping the development ecosystem. These…

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT
18
Mar
2025

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

Analyze Mobile Threats: ANY.RUN Introduces Android OS to Its Interactive Sandbox
18
Mar
2025

ANY.RUN Introduces Android OS to Its Interactive Sandbox

With Android devices deeply embedded in business operations, it’s no surprise that cybercriminals are increasingly targeting them. Businesses are now…

How AI and automation are reshaping security leadership
18
Mar
2025

How AI and automation are reshaping security leadership

The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous…

New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users
18
Mar
2025

New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users

A sophisticated new phishing campaign has been discovered that exploits Microsoft 365’s legitimate infrastructure to conduct highly convincing credential harvesting…