Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign
23
Aug
2025

Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign

Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign Pierluigi Paganini August 23, 2025 Over…

Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
23
Aug
2025

Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails

Microsoft has announced significant restrictions on email sending capabilities for organizations using default onmicrosoft.com domains, implementing a throttling system that…

Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
23
Aug
2025

Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection

A method to silently exfiltrate Windows secrets and credentials, evading detection from most Endpoint Detection and Response (EDR) solutions. This…

COOKIE SPIDER's Malvertising Drops New SHAMOS macOS Malware
23
Aug
2025

COOKIE SPIDER’s Malvertising Drops New SHAMOS macOS Malware

CrowdStrike reports COOKIE SPIDER using malvertising to spread SHAMOS macOS malware (a new variant of AMOS infostealer), stealing credentials, crypto…

Chinese hacker
23
Aug
2025

Murky Panda hackers exploit cloud trust to hack downstream customers

A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial…

Scattered Spider Hacker Noah Michael Urban Sentenced to 10 Years in Prison
22
Aug
2025

Scattered Spider Hacker Noah Michael Urban Jailed for 10 Years

Noah Michael Urban, the 20-year-old hacker from the notorious Scattered Spider group, was sentenced to 10 years in prison. Learn…

China-linked Silk Typhoon Hackers Target SaaS Providers
22
Aug
2025

China-linked Silk Typhoon Hackers Target SaaS Providers

The China-linked advanced persistent threat (APT) group Silk Typhoon has shown a rare ability to compromise trusted relationships in the…

South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members
22
Aug
2025

South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members

A sophisticated South Asian Advanced Persistent Threat (APT) group has been conducting an extensive espionage campaign targeting military personnel and…

Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing
22
Aug
2025

Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing

Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI,…

Agentic AI vs SOAR: What’s the Real Difference?a
22
Aug
2025

Agentic AI vs SOAR: What’s the Real Difference?a

By now, you’ve heard the hype. Agentic AI; self-directed and goal-oriented. Supposedly, the next big thing in security automation. If…

Former developer jailed after deploying kill-switch malware at Ohio firm
22
Aug
2025

Former developer jailed after deploying kill-switch malware at Ohio firm

Former developer jailed after deploying kill-switch malware at Ohio firm Pierluigi Paganini August 22, 2025 Ex-developer jailed 4 years for…

Linux
22
Aug
2025

APT36 hackers abuse Linux .desktop files to install malware in new attacks

The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities…