Latest Articles

Threat Actors Turn to AI to Target Manufacturing Companies, Warns Latest Report

Threat Actors Turn to AI to Target Manufacturing Companies, Warns Latest Report

Manufacturing organizations face mounting cybersecurity challenges as artificial intelligence adoption accelerates across the sector, with new data revealing that 94% of companies now use...
LANDFALL Android Malware Exploits Samsung Zero-Day via Malicious WhatsApp Image

LANDFALL Android Malware Exploits Samsung Zero-Day via Malicious WhatsApp Image

Cybersecurity researchers at Palo Alto Networks' Unit 42 have discovered a sophisticated Android spyware campaign that exploited a critical zero-day vulnerability in Samsung Galaxy...
Microsoft Teams “Chat with Anyone” Feature Raises Security Concerns Over Phishing Risks

Microsoft Teams “Chat with Anyone” Feature Raises Security Concerns Over Phishing Risks

Microsoft's upcoming Teams update, rolling out in targeted releases in early November 2025 and worldwide by January 2026, introduces a feature that lets users...
ClickFix malware campaign

New ClickFix Campaign Uses Malicious Videos to Make Users Infect Themselves

A sophisticated ClickFix social engineering campaign has emerged featuring embedded instructional videos that guide victims through self-infection processes, marking a significant evolution in attack...
Herodotus Android malware

Herodotus Android Malware Gains Total Device Access, Bypassing Antivirus Defenses

A newly discovered Android banking Trojan, Herodotus, is circulating as a Malware-as-a-Service (MaaS) offering, demonstrating how modern mobile threats exploit social engineering and permission...
LockBit 5.0 ransomware

Security Report Details LockBit 5.0’s Advanced Tools and Dual-Step Execution Strategy

Flashpoint's latest technical analysis confirms that LockBit 5.0, which emerged in late September 2025, represents a significant evolutionary leap for the dominant ransomware-as-a-service (RaaS)...

Google Maps Introduces Feature to Report Ransom Demands Linked to Fake Reviews

Bad actors are increasingly turning to review-bombing tactics as a weapon for extortion, leaving legitimate business owners in a precarious position. Rather than compete...

Threat Actors Exploit Exposed RDP Credentials to Distribute Cephalus Ransomware

Cephalus represents an emerging threat in the cybersecurity landscape, with this newly identified ransomware group first appearing in mid-June 2025. The group has quickly...

Foreign Threat Actor Hacks U.S. Congressional Budget Office, Exposes Confidential Data

The Congressional Budget Office, which serves as Congress's independent financial analyst and bookkeeper, has been compromised by a suspected foreign threat actor in what...

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domains

Active Directory sites have long been overlooked as potential attack vectors, relegated to the realm of network infrastructure management rather than security concerns. However,...

Cyber Security Headlines

Cyber Attacks

Data Breach

Hyundai AutoEver Confirms Data Breach Exposing Users’ SSNs and Driver’s License Details

Hyundai AutoEver America, LLC has formally confirmed a data breach that compromised sensitive customer information through a coordinated cyber attack. The automotive...

Cyber AI