China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
27
Sep
2025

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

Sep 27, 2025Ravie LakshmananMalware / Network Security Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as…

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
27
Sep
2025

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations

A sophisticated cybercriminal alliance between malware operators and covert North Korean IT workers has emerged as a significant threat to…

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware
27
Sep
2025

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

A sophisticated malvertising campaign is using fake Microsoft Teams installers to compromise corporate systems, leveraging poisoned search engine results and…

Hackers Use Fake Invoices to Spread XWorm RAT via Office Files
27
Sep
2025

Hackers Use Fake Invoices to Spread XWorm RAT via Office Files

A new wave of email attacks is on the rise, tricking people with fake invoice documents to install the dangerous…

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users
27
Sep
2025

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

A critical security flaw has emerged in Apache Airflow 3.0.3, exposing sensitive connection information to users with only read permissions….

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
27
Sep
2025

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads

A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices across the globe. The campaign…

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups
27
Sep
2025

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups

The cybersecurity landscape continues to evolve as three of the most notorious English-speaking cybercrime groups—LAPSUS$, Scattered Spider, and ShinyHunters—have been…

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
27
Sep
2025

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins

A new wave of cyberattacks targeting organizations using SonicWall firewalls has been actively deploying Akira ransomware since late July 2025….

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach
27
Sep
2025

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach

LummaStealer has emerged as one of the most prolific information-stealing malware families in recent years, targeting victims across multiple industry…

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released
27
Sep
2025

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released

A 17-year-old suspect who surrendered over his alleged role in the 2023 cyberattacks against two major Las Vegas casino operators…

Ali El Kaafarani
26
Sep
2025

UN seeks to build consensus on ‘safe, secure and trustworthy’ AI

The United Nations is making a push to more directly influence global policy on artificial intelligence, including the promotion of…

Microsoft uncovers new variant of XCSSET macOS malware in targeted attacks
26
Sep
2025

Microsoft uncovers new variant of XCSSET macOS malware in targeted attacks

Microsoft uncovers new variant of XCSSET macOS malware in targeted attacks Pierluigi Paganini September 26, 2025 Microsoft Threat Intelligence researchers…