New DEVMAN Ransomware by DragonForce Targets Windows 10 and 11 Users
01
Jul
2025

New DEVMAN Ransomware by DragonForce Targets Windows 10 and 11 Users

A new ransomware variant, dubbed DEVMAN, has surfaced in the cyberthreat landscape, showcasing a complex lineage tied to the notorious…

Bulletproof hosting provider
01
Jul
2025

Aeza Group sanctioned for hosting ransomware, infostealer servers

The U.S. Department of the Treasury has sanctioned Russian hosting company Aeza Group and four operators for allegedly acting as…

Kimusky Hackers Employ ClickFix Technique to Run Malicious Scripts on Victim Devices
01
Jul
2025

Kimusky Hackers Employ ClickFix Technique to Run Malicious Scripts on Victim Devices

The North Korean state-sponsored hacker collective Kimsuky has been found to use a dishonest technique called “ClickFix” to compromise victim…

Hackers Share Tactics and Infrastructure
01
Jul
2025

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has…

Hacktivist Group Launches Attacks on 20+ Critical Sectors Amid Iran–Israel Conflict
01
Jul
2025

Hacktivist Group Launches Attacks on 20+ Critical Sectors Amid Iran–Israel Conflict

A series of sophisticated cyberattacks targeting over 20 vital sectors in Israel and its allies has been launched by more…

Microsoft introduces protection against email bombing
01
Jul
2025

Microsoft introduces protection against email bombing

By the end of July 2025, all Microsoft Defender for Office 365 customers should be protected from email bombing attacks…

Bluetooth headphones
01
Jul
2025

Bluetooth vulnerability in audio devices can be exploited to spy on users

Researchers have found vulnerabilities in 29 Bluetooth devices like speakers, earbuds, headphones, and wireless microphones from reputable companies including Sony,…

Stealthy WordPress Malware Uses PHP Backdoor to Deliver Windows Trojan
01
Jul
2025

Stealthy WordPress Malware Uses PHP Backdoor to Deliver Windows Trojan

A sophisticated malware campaign targeting WordPress websites has recently been uncovered, showcasing an intricate and stealthy approach to delivering a…

FBI Warns of Health Insurance Scam Stealing Personal and Medical Data
01
Jul
2025

FBI Warns of Health Insurance Scam Stealing Personal and Medical Data

The Federal Bureau of Investigation (FBI) has issued a warning about a scam where criminals pretend to be health insurance…

Chrome logo
01
Jul
2025

Update your Chrome to fix new actively exploited zero-day vulnerability

Google has released an update for its Chrome browser to patch an actively exploited flaw. This update is crucial since…

ING Bank transforming operations through agentic AI
01
Jul
2025

ING Bank transforming operations through agentic AI

ING Bank is currently amid multiple projects to improve its operations through the use of agentic artificial intelligence (AI). Projects…

US disrupts North Korean IT worker
01
Jul
2025

US disrupts North Korean IT worker “laptop farm” scheme in 16 states

The U.S. Department of Justice (DoJ) announced coordinated law enforcement actions against North Korean government’s fund raising operations using remote…