U.S. Treasury Warns Crypto ATMs Are Aiding Criminal Activity
05
Aug
2025

U.S. Treasury Warns Crypto ATMs Are Aiding Criminal Activity

The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) has issued Notice FIN-2025-NTC1, dated August 4, 2025, warning…

Navigating Cybersecurity Risks in Crypto-Backed Lending
05
Aug
2025

Navigating Cybersecurity Risks in Crypto-Backed Lending

As crypto-backed lending gathers momentum among institutions and everyday users, cybersecurity shadows every new transaction. Billions in digital assets now…

Snowflake Data Breach
05
Aug
2025

Snowflake Data Breach Explained: Lessons and Protection Strategies

In 2024, the cybersecurity landscape was shaken by an unexpected and widespread incident—the Snowflake data breach. Despite being a leading…

Millions of Dell laptops could be persistently backdoored in ReVault attacks
05
Aug
2025

Millions of Dell laptops could be persistently backdoored in ReVault attacks

A set of firmware vulnerabilities affecting 100+ Dell laptop models widely used in government settings and by the cybersecurity industry…

Iranian hackers were more coordinated, aligned during Israel conflict than it seemed
05
Aug
2025

Iranian hackers were more coordinated, aligned during Israel conflict than it seemed

The apparently disjointed response from Iranian hackers to the 12-day conflict with Israel in June actually demonstrated a significant degree…

New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
05
Aug
2025

New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands

A critical vulnerability in Cursor IDE, the rapidly growing AI-powered development environment, enables persistent remote code execution through manipulation of…

Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft
05
Aug
2025

Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft

Cybersecurity firm CTM360 has uncovered an ongoing malicious operation dubbed “ClickTok,” specifically targeting TikTok Shop users worldwide through a dual-pronged…

Manifest AI Risk turns weeks of model vetting into two clicks
05
Aug
2025

Manifest AI Risk turns weeks of model vetting into two clicks

Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance…

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
05
Aug
2025

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections

Aug 05, 2025Ravie LakshmananSocial Engineering / Malware A combination of propagation methods, narrative sophistication, and evasion techniques enabled the social…

Attacker could defeat Dell firmware flaws with a vegetable
05
Aug
2025

Attacker could defeat Dell firmware flaws with a vegetable

Over 100 models of Dell laptop PCs across the enterprise-centric Lattitude and Precision ranges, and many thousands of individual devices,…

How To Get Real-Time IOCs From Incidents Across 15K SOCs 
05
Aug
2025

How To Get Real-Time IOCs From Incidents Across 15K SOCs 

Cybersecurity is about staying one step ahead. The security of business assets hinges on proactive threat detection and rapid response…

Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
05
Aug
2025

Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender

The North Korean state-sponsored group Kimsuky, also known as APT43, Thallium, and Velvet Chollima, has been accused of launching a…