Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
22
Aug
2025

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called…

New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses
22
Aug
2025

New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

A sophisticated cryptojacking campaign has emerged, exploiting misconfigured Redis servers across multiple continents to deploy cryptocurrency miners while systematically dismantling…

China-linked Murky Panda targets and moves laterally through cloud services
22
Aug
2025

China-linked Murky Panda targets and moves laterally through cloud services

In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions….

Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity
22
Aug
2025

Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity

The Lumma information stealer has evolved from its 2022 origins into one of the most sophisticated malware-as-a-service (MaaS) ecosystems in…

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS
22
Aug
2025

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS

Microsoft Threat Intelligence has spotlighted the escalating adoption of the ClickFix social engineering technique, a sophisticated method that manipulates users…

YouTube Marketing Lesson From RSA Conference 2025
22
Aug
2025

Inspiring Stories On Social Media

22 Aug Women Know Cyber: Inspiring Stories On Social Media Posted at 08:59h in Blogs by Amanada Glassner This week…

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
22
Aug
2025

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

Aug 22, 2025Ravie LakshmananOnline Fraud / Financial Crime INTERPOL on Friday announced that authorities from 18 countries across Africa have…

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram
22
Aug
2025

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram

A sophisticated supply chain attack has emerged targeting developers through a malicious Go module package that masquerades as a legitimate…

How to Develop a Business Continuity Plan for Cyber Security: A Step-by-Step Guide
22
Aug
2025

How to Develop a Business Continuity Plan for Cyber Security: A Step-by-Step Guide

The figures are appalling – 60% of small businesses fail within six months of a cyber-attack. Cyber attackers are all…

Android Under Siege as Hackers Harvest Credentials and Track Keystrokes
22
Aug
2025

Android Under Siege as Hackers Harvest Credentials and Track Keystrokes

The Zscaler ThreatLabz team has uncovered significant advancements in the Anatsa malware, also known as TeaBot, an Android banking trojan…

22
Aug
2025

Inspiring Stories On Social Media

22 Aug Women Know Cyber: Inspiring Stories On Social Media Posted at 08:59h in Blogs by Amanada Glassner This week…

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
22
Aug
2025

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that…