In a recent cyberattack targeting Malaysia Airports Holdings Berhad (MAHB), the nation’s digital infrastructure faced a significant threat. Hackers infiltrated the systems of Kuala Lumpur […]
Month: March 2025
Oracle’s Denial of Alleged Data Breach Sparks Ongoing Debate
In recent developments, Oracle Corporation has firmly denied allegations of a significant data breach within its Oracle Cloud Infrastructure (OCI). These claims, initially brought forward […]
Evilginx: The Persistent Threat Bypassing Multi-Factor Authentication
In the ever-evolving landscape of cybersecurity, multi-factor authentication (MFA) has been widely adopted as a robust defense mechanism to protect user accounts from unauthorized access. […]
Tor Browser 14.0.8: Critical Security Update for Windows Users
On March 27, 2025, The Tor Project released Tor Browser version 14.0.8, an emergency update exclusively for Windows users. This release addresses critical security vulnerabilities […]
Kuala Lumpur International Airport Targeted in Major Cyberattack with $10 Million Ransom Demand
On March 23, 2025, Kuala Lumpur International Airport (KLIA) experienced a significant cyberattack that disrupted its critical digital infrastructure. Hackers demanded a ransom of US$10 […]
Cybercriminals Exploit Google Ads to Target DeepSeek Users with Malware
In a recent and sophisticated cyberattack, malicious actors have been leveraging Google’s sponsored search results to target individuals searching for DeepSeek, a rapidly growing artificial […]
Emergence of Lucid: A Sophisticated Phishing-as-a-Service Platform Exploiting RCS and iMessage
A new and sophisticated phishing platform named Lucid has surfaced, posing a significant cybersecurity threat by targeting 169 entities across 88 countries worldwide. Developed by […]
RedCurl’s QWCrypt Ransomware: A Targeted Threat to Hyper-V Servers
In a significant evolution of cyberattack strategies, the RedCurl threat actor group has introduced a new ransomware variant named QWCrypt, specifically designed to target Microsoft […]
BlackLock Ransomware: A Deep Dive into Its Operations and Downfall
In early 2025, the cyber threat landscape witnessed the rapid ascent of BlackLock ransomware, also known as El Dorado or Eldorado. This ransomware-as-a-service (RaaS) operation […]
Cybercriminals Exploit Fake Booking.com Emails to Compromise Hotel Systems
In a sophisticated cyberattack targeting the hospitality industry, threat actors are impersonating Booking.com to deceive hotel staff into installing malware on their systems. This campaign […]