New Clickfix Attack Promises "Free WiFi" But Delivers Powershell Based Malware
12
Sep
2025

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware

The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public’s need for free internet access,…

12
Sep
2025

New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware

A sophisticated malvertising campaign has been uncovered targeting unsuspecting users through “dangling commits” in a legitimate GitHub repository. Attackers are…

Muck Stealer Malware Used Alongside Phishing in New Attack Waves
12
Sep
2025

Muck Stealer Malware Used Alongside Phishing in New Attack Waves

A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise RAT,…

Ministry of Defence signs £400m sovereign cloud deal with Google
12
Sep
2025

Ministry of Defence signs £400m sovereign cloud deal with Google

The Ministry of Defence (MoD) has selected Google Cloud to provide it with sovereign cloud capabilities in a deal worth…

ASEAN Cybercrime Threat Sparks 10-Year Regional Action Plan
12
Sep
2025

ASEAN Cybercrime Threat Sparks 10-Year Regional Action Plan

Cybercrime and online scams have officially overtaken traditional threats as the primary regional security concern for the Association of Southeast…

Axios Vulnerability Enables Attackers to Crash Node.js Applications via Data Handle Abuse
12
Sep
2025

Axios Vulnerability Enables Attackers to Crash Node.js Applications via Data Handle Abuse

A critical security vulnerability has been discovered in the popular Axios HTTP client library that allows attackers to crash Node.js…

Buterat Backdoor Campaigns Targeting Enterprise Endpoint Control
12
Sep
2025

Buterat Backdoor Campaigns Targeting Enterprise Endpoint Control

Backdoor malware is a covert type of malicious software designed to bypass standard authentication mechanisms and provide persistent, unauthorized access…

Cloud block storage: Key benefits and use cases
12
Sep
2025

Cloud block storage: Key benefits and use cases

Cloud block storage allows organisations to run applications that depend on high throughput and low latency in the cloud. The…

UK’s Legal Aid Agency discloses a data breach following April cyber attack
12
Sep
2025

UK train operator LNER (London North Eastern Railway) discloses a data breach

UK train operator LNER (London North Eastern Railway) discloses a data breach Pierluigi Paganini September 12, 2025 LNER warns of…

Samsung
12
Sep
2025

Samsung patches actively exploited zero-day reported by WhatsApp

Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android devices. Tracked as…

New Malware Using Azure Functions For Hosting Command And Control Infrastructure
12
Sep
2025

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

A new, sophisticated malware campaign has been uncovered that leverages Microsoft’s Azure Functions for its command-and-control (C2) infrastructure, a novel…

Malware Campaign Uses SVG Email Attachments to Deploy XWorm and Remcos RAT
12
Sep
2025

Malware Campaign Uses SVG Email Attachments to Deploy XWorm and Remcos RAT

Recent threat campaigns have revealed an evolving use of BAT-based loaders to deliver Remote Access Trojans (RATs), including XWorm and…