In a case highlighting the complexities of cybersecurity ethics, Nicholas Michael Kloster, a 32-year-old from Kansas City, Missouri, has pleaded guilty to federal computer fraud […]
Month: June 2025
Cybercriminals Exploit CapCut’s Popularity to Steal Apple ID Credentials and Credit Card Information
Cybercriminals are capitalizing on the widespread popularity of CapCut, a leading short-form video editing application developed by ByteDance, to orchestrate sophisticated phishing campaigns aimed at […]
Bipartisan Legislation Seeks to Prohibit Chinese AI in U.S. Federal Agencies
In a significant move to safeguard national security, a bipartisan coalition of U.S. lawmakers has introduced the No Adversarial AI Act, aiming to ban the […]
Exploitation of Microsoft 365’s Direct Send Feature in Phishing Attacks
Cybercriminals have recently exploited Microsoft 365’s Direct Send feature to conduct sophisticated phishing campaigns that bypass traditional email security measures. This feature, designed to facilitate […]
Evidence of Active Exploitation of CitrixBleed 2 Vulnerability
Recent findings indicate that the critical vulnerability known as CitrixBleed 2 (CVE-2025-5777) in Citrix NetScaler systems is being actively exploited by cyber attackers. This flaw […]
Microsoft Unveils New Windows Endpoint Security Platform Following CrowdStrike Outage
In response to the significant global IT disruption caused by the CrowdStrike incident in July 2024, Microsoft has announced the upcoming private preview of its […]
OneClik Malware Exploits Microsoft ClickOnce to Infiltrate Energy Sector
A sophisticated cyber espionage campaign, dubbed OneClik, has been identified targeting the energy, oil, and gas industries. This operation leverages Microsoft’s ClickOnce deployment technology and […]
MOVEit Transfer Under Siege: Surge in Scanning Activity and Exploitation Attempts
In recent weeks, Progress MOVEit Transfer, a widely utilized managed file transfer solution, has experienced a significant uptick in scanning activity, raising alarms about potential […]
Chinese Cyber Group Silver Fox Employs Fake Websites to Deploy Sainbox RAT and Hidden Rootkit
In a recent cybersecurity development, the Chinese state-sponsored hacking group known as Silver Fox, also referred to as Void Arachne, has been identified leveraging counterfeit […]
Mustang Panda’s Targeted Cyber Espionage Campaigns Against the Tibetan Community
In recent developments, the cyber espionage group known as Mustang Panda, also referred to as Hive0154, has intensified its focus on the Tibetan community through […]