New Malvertising Attack Spreads Crypto Stealing PS1Bot Malware
15
Aug
2025

New Malvertising Attack Spreads Crypto Stealing PS1Bot Malware

Cisco Talos researchers have discovered a dangerous new malware framework called PS1Bot. Active since early 2025, this sophisticated threat spreads…

Hack at UnitedHealth's tech unit impacted 192.7 million people
14
Aug
2025

Hack at UnitedHealth’s tech unit impacted 192.7 million people

The cyberattack at UnitedHealth Group’s tech unit last year impacted 192.7 million people, the U.S. health department’s website showed. In…

Over $300 million in cybercrime crypto seized in anti-fraud effort
14
Aug
2025

Over $300 million in cybercrime crypto seized in anti-fraud effort

More than $300 million worth of cryptocurrency linked to cybercrime and fraud schemes has been frozen due to two separate…

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware
14
Aug
2025

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware

Cybercriminals have escalated their proxyjacking campaigns by exploiting legitimate user behavior around YouTube video downloads, according to a recent security…

ATO considers AI coding assistance for 800 core developers
14
Aug
2025

ATO considers AI coding assistance for 800 core developers

The Australian Taxation Office (ATO) is exploring the use of artificial intelligence to assist its 800 core developers with addressing…

New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals
14
Aug
2025

New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals

The cybersecurity landscape is witnessing a fundamental transformation as artificial intelligence becomes the newest weapon in cybercriminals’ arsenals, revolutionizing traditional…

Threat Actors Leverage CrossC2 to Extend Cobalt Strike to Linux and macOS
14
Aug
2025

Threat Actors Leverage CrossC2 to Extend Cobalt Strike to Linux and macOS

JPCERT/CC verified a number of events in which threat actors were seen using CrossC2, an unofficial extension tool that creates…

Multi-Stage Malware Framework Targeting Windows Systems
14
Aug
2025

Multi-Stage Malware Framework Targeting Windows Systems

Cisco Talos researchers have uncovered an aggressive malware campaign active since early 2025, deploying a sophisticated multi-stage framework dubbed PS1Bot,…

Norway confirms dam intrusion by Pro-Russian hackers
14
Aug
2025

Norway confirms dam intrusion by Pro-Russian hackers

Norway confirms dam intrusion by Pro-Russian hackers Pierluigi Paganini August 14, 2025 Norway’s security service PST says pro-Russian hackers took…

Crypto24 ransomware hits large orgs with custom EDR evasion tool
14
Aug
2025

Crypto24 ransomware hits large orgs with custom EDR evasion tool

The Crypto24 ransomware group has been using custom utilities to evade security solutions on breached networks, exfiltrate data, and encrypt files. The…

Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification
14
Aug
2025

Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification

Google has achieved a significant milestone in mobile security with the announcement that Android’s protected KVM (pKVM) hypervisor has officially…

How to Build a Homoglyph Phishing Link That Bypasses Human Detection — Even Booking.com Users
14
Aug
2025

How to Build a Homoglyph Phishing Link That Bypasses Human Detection — Even Booking.com Users

How to Build a Homoglyph Phishing Link That Bypasses Human Detection — Even Booking.com Users Skip to content We use…