Zoom
06
Aug
2025

New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations

A new post-exploitation command-and-control (C2) evasion method called ‘Ghost Calls’ abuses TURN servers used by conferencing apps like Zoom and…

Google's Salesforce Instances Hacked in Ongoing Attack
06
Aug
2025

Google’s Salesforce Instances Hacked in Ongoing Attack

Google has confirmed that one of its corporate Salesforce instances was compromised in June by the threat group tracked as…

Fake Antivirus App Delivers LunaSpy Malware to Android Devices
06
Aug
2025

Fake Antivirus App Delivers LunaSpy Malware to Android Devices

A sophisticated cybercrime campaign has been discovered targeting Android users through fake antivirus applications that actually deliver LunaSpy spyware to…

NCSC updates CNI Cyber Assessment Framework
06
Aug
2025

NCSC updates CNI Cyber Assessment Framework

The UK’s National Cyber Security Centre (NCSC) has rolled out a series of updates to its Cyber Assessment Framework (CAF)…

WhatsApp cracks down on 6.8M scam accounts in global takedown
06
Aug
2025

WhatsApp cracks down on 6.8M scam accounts in global takedown

WhatsApp cracks down on 6.8M scam accounts in global takedown Pierluigi Paganini August 06, 2025 WhatsApp removed 6.8M accounts linked…

CISA’s relationship with industry needs work to reestablish trust, experts say
06
Aug
2025

CISA’s relationship with industry needs work to reestablish trust, experts say

LAS VEGAS — Collaboration between agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and private industry remains essential to build…

Phishing
06
Aug
2025

Hacker extradited to US for stealing $3.3 million from taxpayers

Nigerian national Chukwuemeka Victor Amachukwu has been extradited from France to the U.S. to face charges of hacking, fraud, and…

Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome
06
Aug
2025

Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome

A sophisticated new cyber campaign has emerged targeting Windows users through a deceptive malware variant known as ToneShell, which masquerades…

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware
06
Aug
2025

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

UAC-0099 is a threat actor organization that has been targeting state officials, defense forces, and defense-industrial firms in a series…

Top US energy companies frequently exposed to critical security flaws
06
Aug
2025

Top US energy companies frequently exposed to critical security flaws

Dive Brief: More than 20 of the United States’ top energy companies are vulnerable to cyberattacks because they use equipment…

Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k
06
Aug
2025

Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k

In a sophisticated campaign uncovered in early 2024, cybercriminals have begun distributing malicious Ethereum smart contracts masquerading as lucrative trading…

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites
06
Aug
2025

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites

Threat actors are increasingly leveraging generative AI (GenAI) tools to craft highly convincing phishing websites that impersonate legitimate government portals….