ESET Warns Cybercriminals Are Targeting NFC Data for Contactless Payments
28
Jun
2025

ESET Warns Cybercriminals Are Targeting NFC Data for Contactless Payments

ESET researchers have uncovered a sophisticated attack vector exploiting Near Field Communication (NFC) data, initially targeting Czech banking customers but…

Threat Actors Exploit Windows and Linux Server Vulnerabilities to Deploy Web Shells
28
Jun
2025

Threat Actors Exploit Windows and Linux Server Vulnerabilities to Deploy Web Shells

Threat actors have been observed exploiting file upload vulnerabilities to deploy web shells and advanced malware on both Windows and…

Qilin Ransomware Attack on NHS Causes Patient Death in London
28
Jun
2025

Qilin Ransomware Attack on NHS Causes Patient Death in the UK

A patient’s death has been officially connected to a cyber attack carried out by the Qilin ransomware group that crippled…

FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering
28
Jun
2025

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening…

ICE Rolls Facial Recognition Tools Out to Officers' Phones
28
Jun
2025

ICE Rolls Facial Recognition Tools Out to Officers’ Phones

WIRED published a shocking investigation this week based on records, including audio recordings, of hundreds of emergency calls from United…

Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware
28
Jun
2025

Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware

A sophisticated social engineering campaign has surfaced on TikTok, leveraging the platform’s massive user base and algorithmic reach to distribute…

Weaponized DeepSeek Installers Deploy Sainbox RAT and Hidden Rootkit
28
Jun
2025

Weaponized DeepSeek Installers Deploy Sainbox RAT and Hidden Rootkit

Netskope Threat Labs has uncovered a malicious campaign exploiting fake software installers, including those mimicking popular tools like DeepSeek, Sogou,…

Facebook's New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
28
Jun
2025

Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

Jun 28, 2025Ravie LakshmananPrivacy / Data Protection Facebook, the social network platform owned by Meta, is asking for users to…

Cybercriminals Exploit CapCut Popularity to Steal Apple ID Credentials and Credit Card Data
28
Jun
2025

Cybercriminals Exploit CapCut Popularity to Steal Apple ID Credentials and Credit Card Data

Threat actors have capitalized on the immense popularity of CapCut, the leading short-form video editing app, to orchestrate a highly…

Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos
28
Jun
2025

Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos

New research from Cisco Talos reveals a rise in cybercriminals abusing Large Language Models (LLMs) to enhance their illicit activities….

GIFTEDCROOK Malware
28
Jun
2025

From Browser Stealer to Intelligence-Gathering Tool

Jun 28, 2025Ravie LakshmananMalware / Cyber Warfare The threat actor behind the GIFTEDCROOK malware has made significant updates to turn…

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials
28
Jun
2025

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

A sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users through a deceptive method known as Clickfix…