In the ever-evolving landscape of cyber threats, a new and formidable adversary has emerged: Crocodilus. This advanced Android banking Trojan has rapidly transitioned from localized […]
Day: June 5, 2025
Massive AT&T Data Breach Exposes 86 Million Customer Records with Decrypted Social Security Numbers
In a significant cybersecurity incident, personal information of approximately 86 million AT&T customers has been leaked online. Hackers have reportedly decrypted previously protected Social Security […]
Detecting Business Email Compromise Attacks Early: Strategies and Solutions
Business Email Compromise (BEC) attacks have emerged as a significant threat to organizations worldwide. Unlike traditional cyberattacks that rely on malware, BEC schemes exploit human […]
Sophisticated Malware Campaign Targets Brazilian Users via Malicious Browser Extensions
Cybersecurity researchers have uncovered a sophisticated malware campaign, dubbed Operation Phantom Enigma, targeting Brazilian users through malicious browser extensions designed to steal sensitive banking credentials […]
APT37 Hackers Exploit Academic Forum Invitations to Deploy Malicious LNK Files via Dropbox
In March 2025, the North Korean state-sponsored hacking group APT37, also known as ScarCruft or Reaper, initiated a sophisticated spear-phishing campaign targeting South Korean activists […]
Cybersecurity Vulnerabilities in Solar Power Systems Pose Global Energy Risks
The rapid expansion of solar energy infrastructure has introduced significant cybersecurity vulnerabilities, with approximately 35,000 solar power devices across 42 vendors worldwide exposed to potential […]
Authorities Dismantle BidenCash: A Major Dark Web Marketplace with Over 117,000 Users
In a significant blow to cybercrime, federal authorities have successfully dismantled BidenCash, a prominent criminal marketplace operating on both the dark web and the traditional […]
Wireshark Vulnerability Exposes Networks to Denial-of-Service Attacks
A significant security flaw has been identified in Wireshark, the widely utilized network protocol analyzer, potentially allowing attackers to execute denial-of-service (DoS) attacks through malicious […]
Cybercriminals Exploit URL Protection Services to Conceal Phishing Links
In a concerning development, cybercriminals have begun exploiting legitimate URL protection services to mask malicious phishing links, thereby increasing the effectiveness of their attacks. These […]
Critical Vulnerability in Cisco ISE Exposes Cloud Deployments to Unauthorized Access
Cisco has identified a critical security vulnerability in its Identity Services Engine (ISE) software, specifically affecting deployments on major cloud platforms such as Amazon Web […]