Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
14
Nov
2025

Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors abuse legitimate JSON storage services to deliver malware to software…

A piece of the code inside the vbs file with the last line commented out.
14
Nov
2025

Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials

Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT)…

A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
14
Nov
2025

A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn

A suspected (but currently unidentified) zero-day vulnerability in Fortinet FortiWeb is being exploited by unauthenticated attackers to create new admin…

Apple
14
Nov
2025

Your passport, now on your iPhone. Helpful or risky?

Apple has launched Digital ID, a way for users in the US to create and present a government-issued ID in Apple…

Android
14
Nov
2025

Google backpedals on new Android developer registration rules

Google is backpedaling on its decision to introduce new identity verification rules for all developers, stating that it will also…

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years
14
Nov
2025

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Security researcher Paul McCarty uncovered a significant coordinated spam campaign targeting the npm ecosystem. The IndonesianFoods worm, as it has…

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
14
Nov
2025

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques

A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more…

Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
14
Nov
2025

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date….

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
14
Nov
2025

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands

Cisco has released security updates to address two critical vulnerabilities in Unified Contact Center Express (Unified CCX) that could allow…

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
14
Nov
2025

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques

Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion…

Top 100 Cybersecurity Leaders In The U.S. Announced
14
Nov
2025

Top 100 Cybersecurity Leaders In The U.S. Announced

To recognize the individuals driving the transformation of cybersecurity in the United States, The Cyber Express, in collaboration with Suraksha…

Robert Rea
14
Nov
2025

The retail sector needs a cybersecurity talent incubator

Retail giants have a target on their backs. Hackers are picking them apart at a rate rarely seen in other…