New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies
03
Oct
2025

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

An operator known as GhostSocks advertised a novel Malware-as-a-Service (MaaS) on the Russian cybercrime forum XSS.is on October 15, 2023,…

AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense
03
Oct
2025

AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense

Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real time response, and…

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
03
Oct
2025

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In a recent wave of targeted phishing campaigns, the Cavalry Werewolf cluster has escalated its operations by impersonating government officials…

ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE
03
Oct
2025

ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE

ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE Pierluigi Paganini October 03, 2025 Researchers uncovered…

Salesforce
03
Oct
2025

ShinyHunters launches Salesforce data leak site to extort 39 victims

An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of…

New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems
03
Oct
2025

New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems

AmCache plays a vital role in identifying malicious activities in Windows systems. This tool allows the identification of both benign…

New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
03
Oct
2025

New Android Spyware Targeting Users by Imitating Signal and ToTok Apps

ESET researchers have uncovered two sophisticated Android spyware campaigns that target users seeking secure communication platforms by impersonating popular messaging…

Cybersecurity News tidbits
03
Oct
2025

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach

SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide…

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
03
Oct
2025

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In recent months, a sophisticated campaign dubbed Cavalry Werewolf has emerged, targeting government and critical infrastructure organizations across Russia and…

Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing
03
Oct
2025

Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing

In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these relationships bring…

ICE Wants to Build Out a 24/7 Social Media Surveillance Team
03
Oct
2025

ICE Wants to Build Out a 24/7 Social Media Surveillance Team

United States immigration authorities are moving to dramatically expand their social media surveillance, with plans to hire nearly 30 contractors…

Lessons from Ireland on closing the cybersecurity talent gap
03
Oct
2025

Best Security Practices for Your Golden Years

As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate…