ESET Threat Report H1 2025
28
Jun
2025

ESET Threat Report H1 2025

ESET Research Threat Reports A view of the H1 2025 threat landscape as seen by ESET telemetry and from the…

Ransomware encryption rates decline
28
Jun
2025

Ransomware Response Improves Even As Preparation Lags

One bright spot in Sophos’ annual State of Ransomware report released this week is that organizations have gotten better at…

Greg Otto
28
Jun
2025

Scattered Spider strikes again? Aviation industry appears to be next target for criminal group

The aviation industry has seemingly become the latest target of Scattered Spider, a sophisticated cybercriminal group that has shifted its…

Exploitation of Microsoft 365 Direct Send to Deliver Phishing Emails as Internal Users
28
Jun
2025

Exploitation of Microsoft 365 Direct Send to Deliver Phishing Emails as Internal Users

A sophisticated phishing campaign targeting over 70 organizations, predominantly in the US, has been uncovered by Varonis’ Managed Data Detection…

CrowdStrike cuts 5% of workforce after revenue jumped 29% last year
27
Jun
2025

Microsoft security updates address CrowdStrike crash, kill ‘Blue Screen of Death’

When a faulty software update from cybersecurity firm CrowdStrike last year caused possibly the largest IT outage in history, Microsoft…

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials
27
Jun
2025

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting…

Preparation and appreciation – the human factor in incident response
27
Jun
2025

Citrix Bleed 2 under active attack, reports suggest

A freshly-discovered vulnerability in the perennially under-fire Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway appliances, that has been…

Taking over millions of developers exploiting an Open VSX Registry flaw
27
Jun
2025

Taking over millions of developers exploiting an Open VSX Registry flaw

Taking over millions of developers exploiting an Open VSX Registry flaw Pierluigi Paganini June 27, 2025 A critical flaw in…

Slavery, torture, human trafficking discovered at 53 Cambodian online scamming compunds
27
Jun
2025

Slavery, torture, human trafficking discovered at 53 Cambodian online scamming compunds

An Amnesty International investigation uncovered 53 scamming compounds in Cambodia where people, including children and human trafficking victims, were forced…

Threat Actors Leverage Windows Task Scheduler to Embed Malware and Maintain Persistence
27
Jun
2025

Threat Actors Leverage Windows Task Scheduler to Embed Malware and Maintain Persistence

A comprehensive follow-up analysis to the FortiGuard Incident Response Team’s (FGIR) investigation titled “Intrusion into Middle East Critical National Infrastructure”…

Scattered Spider cyber gang turns fire on aviation sector
27
Jun
2025

Scattered Spider cyber gang turns fire on aviation sector

Scattered Spider, the teenaged hacking collective behind recent cyber attacks on UK retailers Marks and Spencer (M&S) and Co-op, appears…

Scattered Spider
27
Jun
2025

Scattered Spider hackers shift focus to aviation, transportation firms

Hackers associated with “Scattered Spider” tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance…