AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Security Attacks
13
Sep
2025

AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Security Attacks

Security researchers at Straiker’s AI Research (STAR) team have uncovered Villager, an AI-native penetration testing framework developed by Chinese-based group…

Qrator Labs Mitigated Record L7 DDoS Attack from 5.76M-Device Botnet
13
Sep
2025

Qrator Labs Mitigated Record L7 DDoS Attack from 5.76M-Device Botnet

In early September, Qrator Labs detected and mitigated one of the most significant L7 DDoS attacks seen this year, carried…

A CISO’s Guide to Managing Cyber Risk in Healthcare
13
Sep
2025

A CISO’s Guide to Managing Cyber Risk in Healthcare

Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the…

Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical
13
Sep
2025

Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical

The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools…

HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya
13
Sep
2025

HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya

HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya Pierluigi Paganini September 13, 2025 HybridPetya ransomware bypasses UEFI Secure Boot to…

New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts
13
Sep
2025

New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts

Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique to bypass…

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
13
Sep
2025

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with…

New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
13
Sep
2025

New Malvertising Campaign Leverages GitHub Repository to Deliver Malware

A sophisticated malvertising campaign has emerged, exploiting GitHub repositories through dangling commits to distribute malware via fake GitHub Desktop clients….

EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
13
Sep
2025

EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections

A sophisticated malware campaign has emerged that leverages artificial intelligence to create deceptively legitimate applications, marking a significant evolution in…

Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints
13
Sep
2025

Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

A sophisticated backdoor malware known as Backdoor.WIN32.Buterat has emerged as a significant threat to enterprise networks, demonstrating advanced persistence techniques…

What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
13
Sep
2025

What Are The Takeaways from The Scattered Lapsus $Hunters Statement?

The well-known group of cybercriminals called Scattered Lapsus$ Hunters released a surprising farewell statement on BreachForums. This manifesto, a mix…

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT
13
Sep
2025

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Cybersecurity researchers have uncovered a sophisticated malware campaign that exploits SVG (Scalable Vector Graphics) files and email attachments to distribute…