Renault and Dacia UK warn of data breach impacting customers
03
Oct
2025

Renault and Dacia UK warn of data breach impacting customers

Customers of Renault and Dacia in the United Kingdom have been notified that sensitive information they shared with the car…

Scattered LAPSUS$ Hunters Announce Salesforce Breach List On New Onion Site
03
Oct
2025

Scattered LAPSUS$ Hunters Announce Salesforce Breach List On New Onion Site

A cybercrime collective known as Scattered LAPSUS$ Hunters has launched a new data leak site on the dark web, claiming…

Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns
03
Oct
2025

Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns

The cybersecurity firm Bitsight has issued a major warning about a rapid increase in critical systems left vulnerable on the…

CommetJacking attack tricks Comet browser into stealing emails
03
Oct
2025

CommetJacking attack tricks Comet browser into stealing emails

A new attack called ‘CometJacking’ exploits URL parameters to pass to Perplexity’s Comet AI browser hidden instructions that allow access to sensitive…

Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads
03
Oct
2025

Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads

Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated exploitation effort. …

New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications
03
Oct
2025

New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications

In the constantly evolving world of cyber threats, staying informed is not just an advantage; it’s a necessity. First observed…

Asahi truck
03
Oct
2025

Japanese beer giant Asahi confirms ransomware attack

Japanese beer-making giant Asahi has disclosed today that a ransomware attack caused the IT disruptions that forced it to shut…

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies
03
Oct
2025

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

An operator known as GhostSocks advertised a novel Malware-as-a-Service (MaaS) on the Russian cybercrime forum XSS.is on October 15, 2023,…

AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense
03
Oct
2025

AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense

Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real time response, and…

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
03
Oct
2025

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In a recent wave of targeted phishing campaigns, the Cavalry Werewolf cluster has escalated its operations by impersonating government officials…

ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE
03
Oct
2025

ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE

ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE Pierluigi Paganini October 03, 2025 Researchers uncovered…

Salesforce
03
Oct
2025

ShinyHunters launches Salesforce data leak site to extort 39 victims

An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of…