BlackSuit, Royal ransomware group hit over 450 US victims before last month’s takedown
07
Aug
2025

BlackSuit, Royal ransomware group hit over 450 US victims before last month’s takedown

LAS VEGAS — The Russian cybercrime group behind BlackSuit and Royal ransomware was more prolific and successful at extorting payments…

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
07
Aug
2025

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks

Researchers at Cyata have disclosed nine previously unknown zero-day vulnerabilities in HashiCorp Vault, a widely adopted open-source secrets management platform,…

likes to adult blogspot pages investigated
07
Aug
2025

Adult sites trick users into Liking Facebook posts using a clickjack Trojan

As the use of age verification to access adult websites increases in various countries around the world, shady websites with…

GPT-5
07
Aug
2025

ChatGPT’s GPT-5 models released: everything you need to know

After a long wait, GPT-5 is finally rolling out. It’s available for free, Plus, Pro and Team users today. This…

Encryption Made for Police and Military Radios May Be Easily Cracked
07
Aug
2025

Encryption Made for Police and Military Radios May Be Easily Cracked

For this reason, Murgatroyd noted that purchasers of TETRA-based radios are free to deploy other solutions for end-to-end encryption on…

How Machine Learning Detects Living off the Land (LotL) Attacks
07
Aug
2025

How Machine Learning Detects Living off the Land (LotL) Attacks

Elite cybercriminals prefer LotL attacks because they’re incredibly hard to spot. Instead of deploying obvious malware, attackers use the same…

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
07
Aug
2025

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution…

Wired
07
Aug
2025

Mysterious Crime Spree Targeted National Guard Equipment Stashes

A string of previously undisclosed break-ins at Tennessee National Guard armories last fall marks the latest in a growing series…

Splunk Unveils PLoB Tool to Detect Compromised Credential Usage
07
Aug
2025

Splunk Unveils PLoB Tool to Detect Compromised Credential Usage

Splunk has introduced PLoB (Post-Logon Behaviour Fingerprinting and Detection) in a world where compromised credentials remain the primary vector for…

What GPT‑5 means for IT teams, devs, and the future of AI at work
07
Aug
2025

What GPT‑5 means for IT teams, devs, and the future of AI at work

OpenAI has released GPT‑5, the newest version of its large language model. It’s now available to developers and ChatGPT users,…

Hacker
07
Aug
2025

New EDR killer tool used by eight different ransomware groups

A new Endpoint Detection and Response (EDR) killer that is considered to be the evolution of ‘EDRKillShifter,’ developed by RansomHub, has…

Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems
07
Aug
2025

Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems

Threat actors are increasingly using Scalable Vector Graphics (SVG) files to get beyond traditional defenses in the quickly developing field…