North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware
19
Aug
2025

North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware

A sophisticated espionage campaign targeting diplomatic missions in South Korea has exposed the evolving tactics of North Korean state-sponsored hackers….

47,000 Individuals Affected by Data Breach, Reveals NY Business Council
19
Aug
2025

47,000 Individuals Affected by Data Breach, Reveals NY Business Council

The Business Council of New York State, Inc., a prominent commercial organization based in Albany, has disclosed a data breach…

PyPI now blocks domain resurrection attacks used for hijacking accounts
19
Aug
2025

PyPI now blocks domain resurrection attacks used for hijacking accounts

The Python Package Index (PyPI) has introduced new protections against domain resurrection attacks that enable hijacking accounts through password resets….

How Winning SOCs Always Stay Ahead of Threats 
19
Aug
2025

How Winning SOCs Always Stay Ahead of Threats 

Despite the escalating danger of cybersecurity breaches, high-performing Security Operations Centers are able to maintain their resilience and prevent attacks….

New Research Exposes DPRK IT Workers' Email Addresses and Recruitment Trends
19
Aug
2025

New Research Exposes DPRK IT Workers’ Email Addresses and Recruitment Trends

New cybersecurity research has revealed important details about how DPRK-affiliated IT professionals, who fall under Microsoft’s “Jasper Sleet” threat actor…

Microsoft Teams
19
Aug
2025

Microsoft shares workaround for Teams “couldn’t connect” error

Microsoft is resolving a known issue that causes “couldn’t connect” errors when launching the Microsoft Teams desktop and web applications….

New Research Unmask DPRK IT Workers Email Address and Hiring Patterns
19
Aug
2025

New Research Unmask DPRK IT Workers Email Address and Hiring Patterns

Recent cybersecurity intelligence has exposed a sophisticated infiltration campaign orchestrated by North Korean state-sponsored threat actors, specifically the Jasper Sleet…

Innovator Spotlight: Backslash Security
19
Aug
2025

Innovator Spotlight: Backslash Security – Cyber Defense Magazine

Securing the Future of AI Powered Coding:  Where Speed Meets Risk The rise of AI powered coding tools like Cursor and…

Noodlophile Stealer evolution - Security Affairs
19
Aug
2025

Noodlophile Stealer evolution – Security Affairs

Noodlophile Stealer evolution Pierluigi Paganini August 19, 2025 Noodlophile malware spreads via copyright phishing, targeting firms in the U.S., Europe,…

Hong Kong police received over 440,000 leads on cyberattacks against city in 2024
19
Aug
2025

Hong Kong police received over 440,000 leads on cyberattacks against city in 2024

Hong Kong police received more than 440,000 pieces of intelligence on cyberthreats targeting the city last year, while 5 per…

Okta open-sources Auth0 rules catalog for threat detection
19
Aug
2025

Okta open-sources catalog of Auth0 rules for threat detection

Okta has open-sourced ready-made Sigma-based queries for Auth0 customers to detect account takeovers, misconfigurations, and suspicious behavior in event logs….

New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities
19
Aug
2025

New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities

A comprehensive security analysis has revealed alarming vulnerabilities affecting over 700 million users across multiple VPN applications, exposing critical flaws…