Akira Ransomware Group Poses ‘Imminent Threat,’ CISA Warns
13
Nov
2025

Akira Ransomware Group Poses ‘Imminent Threat,’ CISA Warns

The Akira ransomware group poses an “imminent threat to critical infrastructure,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned…

Google Sues 'Lighthouse' Phishing-as-a-service Kit Behind Massive Phishing Attacks
13
Nov
2025

Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Google security researchers recently uncovered a sophisticated criminal operation called “Lighthouse” that has victimized over one million people across more…

Australia's AUKUS base to connect to subsea cables
13
Nov
2025

Australia’s AUKUS base to connect to subsea cables

Australia’s AUKUS submarine fleet base and its vicinity are being quietly connected to three powerful new undersea internet cables planned…

Chrome extension “Safery” steals Ethereum wallet seed phrases
13
Nov
2025

Chrome extension “Safery” steals Ethereum wallet seed phrases

Chrome extension “Safery” steals Ethereum wallet seed phrases Pierluigi Paganini November 13, 2025 Malicious Chrome extension “Safery: Ethereum Wallet” steals…

RCE flaw in ImunifyAV puts millions of Linux-hosted sites at risk
13
Nov
2025

RCE flaw in ImunifyAV puts millions of Linux-hosted sites at risk

The ImunifyAV malware scanner for Linux servers, used by tens of millions of websites, is vulnerable to a remote code execution…

Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program
13
Nov
2025

Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program

Cybercriminals are now exploiting remote monitoring and management tools to spread dangerous malware while avoiding detection by security systems. The…

New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 
13
Nov
2025

New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 

ANY.RUN experts recently uncovered a new XWorm campaign that uses steganography to conceal malicious payloads inside seemingly harmless PNG images. What appears to…

top ransomware groups October 2025
13
Nov
2025

Ransomware Attacks Soared 30% In October

Ransomware attacks soared 30% in October to the second-highest total on record, Cyble reported today. The 623 ransomware attacks recorded…

The Washington Post building in Washington. (Andrej Sokolow/Getty Images)
13
Nov
2025

Washington Post confirms data on nearly 10,000 people stolen from its Oracle environment

The Washington Post said it, too, was impacted by the data theft and extortion campaign targeting Oracle E-Business Suite customers,…

Operation Endgame - 1,000+ Servers Used by Rhadamanthys, VenomRAT, and Elysium Dismantled
13
Nov
2025

Operation Endgame – 1,000+ Servers Used by Rhadamanthys, VenomRAT, and Elysium Dismantled

Law enforcement agencies disrupted a vast network of cybercrime tools between November 10 and 14, 2025, coordinated from Europol’s headquarters…

Scam Alert: How WhatsApp’s Screen-Sharing Feature Is Used to Steal Your Money
13
Nov
2025

Scammers Abuse WhatsApp Screen Sharing to Steal OTPs and Funds – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A fast-spreading threat, known as the screen-sharing scam, is using a simple feature on WhatsApp to steal money and personal…

Interview: EcoOnline’s David Picton on finding a business case for IT sustainability
13
Nov
2025

Interview: EcoOnline’s David Picton on finding a business case for IT sustainability

Enthusiasm for corporate sustainability appears to be waning, with major firms seemingly quietly abandoning environmental goals, but David Picton remains…