New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model
07
Nov
2025

New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model

LockBit has remained one of the most dominant ransomware-as-a-service (RaaS) groups in the world since its emergence as ABCD ransomware…

clipboard writing
07
Nov
2025

Fake CAPTCHA sites now have tutorial videos to help victims install malware

Early on in 2025, I described how criminals used fake CAPTCHA sites and a clipboard hijacker to provide instructions for…

CVE-2025-12779: Amazon WorkSpaces Linux Vulnerability
07
Nov
2025

CVE-2025-12779: Amazon WorkSpaces Linux Vulnerability

A newly disclosed security flaw in the Amazon WorkSpaces client for Linux has raised serious concerns across organizations relying on AWS virtual desktop infrastructure. The…

Exploiting JWT Vulnerabilities: Advanced Exploitation Guide
07
Nov
2025

Exploiting JWT Vulnerabilities: Advanced Exploitation Guide

Before JSON Web Tokens (JWTs) became popular in today’s app development landscape, web applications predominantly used server-side sessions, which presented…

New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
07
Nov
2025

New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model

LockBit 5.0 made its debut in late September 2025, marking a significant upgrade for one of the most notorious ransomware-as-a-service…

Weaponized Videos Trigger Self-Infection Tactics
07
Nov
2025

Weaponized Videos Trigger Self-Infection Tactics

ClickFix attacks have surged dramatically over the past year, cementing their position as pivotal tools in the modern attacker’s arsenal….

University Of Pennsylvania Confirms Major Cyberattack
07
Nov
2025

University Of Pennsylvania Confirms Major Cyberattack

The University of Pennsylvania has confirmed that a hacker stole sensitive university data during a recent cyberattack. The breach, first detected on…

Robert Rea
07
Nov
2025

The quiet revolution: How regulation is forcing cybersecurity accountability

Cybersecurity headlines still focus on the headline-grabbing moments, whether it’s the latest breach, a zero-day exploit, or an eye-catching product…

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs
07
Nov
2025

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Russian-based threat actors are distributing a sophisticated Android Remote Access Trojan through underground channels, offering it as a subscription service…

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
07
Nov
2025

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware

A new ransomware group, Cephalus, has emerged in the cybersecurity threat landscape, targeting organizations through compromised Remote Desktop Protocol (RDP)…

Cisco Warns Of Critical Unified CCX Flaws CVE-2025-20354
07
Nov
2025

Cisco Warns Of Critical Unified CCX Flaws CVE-2025-20354

Cisco has issued an urgent security advisory detailing two critical vulnerabilities affecting its Unified Contact Center Express (Unified CCX) platform. The flaws,…

Google
07
Nov
2025

Leak confirms Google Gemini 3 Pro and Nano Banana 2 could launch soon

Google is planning to ship two new models. One is Gemini 3, which is optimised for coding and regular use,…