Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware
27
Sep
2025

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

A sophisticated malvertising campaign is using fake Microsoft Teams installers to compromise corporate systems, leveraging poisoned search engine results and…

Hackers Use Fake Invoices to Spread XWorm RAT via Office Files
27
Sep
2025

Hackers Use Fake Invoices to Spread XWorm RAT via Office Files

A new wave of email attacks is on the rise, tricking people with fake invoice documents to install the dangerous…

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users
27
Sep
2025

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

A critical security flaw has emerged in Apache Airflow 3.0.3, exposing sensitive connection information to users with only read permissions….

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
27
Sep
2025

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads

A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices across the globe. The campaign…

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups
27
Sep
2025

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups

The cybersecurity landscape continues to evolve as three of the most notorious English-speaking cybercrime groups—LAPSUS$, Scattered Spider, and ShinyHunters—have been…

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
27
Sep
2025

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins

A new wave of cyberattacks targeting organizations using SonicWall firewalls has been actively deploying Akira ransomware since late July 2025….

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach
27
Sep
2025

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach

LummaStealer has emerged as one of the most prolific information-stealing malware families in recent years, targeting victims across multiple industry…

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released
27
Sep
2025

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released

A 17-year-old suspect who surrendered over his alleged role in the 2023 cyberattacks against two major Las Vegas casino operators…

Ali El Kaafarani
26
Sep
2025

UN seeks to build consensus on ‘safe, secure and trustworthy’ AI

The United Nations is making a push to more directly influence global policy on artificial intelligence, including the promotion of…

Microsoft uncovers new variant of XCSSET macOS malware in targeted attacks
26
Sep
2025

Microsoft uncovers new variant of XCSSET macOS malware in targeted attacks

Microsoft uncovers new variant of XCSSET macOS malware in targeted attacks Pierluigi Paganini September 26, 2025 Microsoft Threat Intelligence researchers…

AI Microsoft Photos
26
Sep
2025

Microsoft’s new AI feature will organize your photos automatically

Microsoft has begun testing a new AI-powered feature in Microsoft Photos, designed to categorize photos automatically on Windows 11 systems….

Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification
26
Sep
2025

Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification

In the wake of Charlie Kirk’s killing, the Republican policy apparatus went immediately to work. The Heritage Foundation, which published…