LinkedIn: The New Frontier for Phishing Attacks Phishing attacks have evolved beyond traditional email-based schemes, with platforms like LinkedIn emerging as prime targets for cybercriminals. […]
Archives
EVALUSION Cyber Campaign Unveils Amatera Stealer, NetSupport RAT via ClickFix Tactics
EVALUSION Campaign: Unveiling the Amatera Stealer and NetSupport RAT Threat In November 2025, cybersecurity experts identified a sophisticated malware campaign, dubbed EVALUSION, leveraging the ClickFix […]
Google Releases Critical Chrome Update to Fix Actively Exploited Vulnerability CVE-2025-13223
Google has recently released critical security updates for its Chrome browser, addressing two significant vulnerabilities, including one that has been actively exploited in the wild. […]
Microsoft Mitigates Record-Breaking 15.72 Tbps DDoS Attack by AISURU Botnet Targeting Australian Endpoint
Microsoft Thwarts Unprecedented 15.72 Tbps DDoS Attack Orchestrated by AISURU Botnet In a remarkable display of cybersecurity resilience, Microsoft has successfully mitigated a colossal distributed […]
Hackers Exploit Cursor’s Vulnerability via Rogue MCP Servers, Risking Developer System Security
Hackers Exploit Rogue MCP Servers to Compromise Cursor’s Embedded Browser A critical security vulnerability has been identified in Cursor’s integrated browser, enabling attackers to inject […]
LG Electronics Faces Potential Data Breach as Source Code and Credentials Allegedly Leaked
LG Electronics Faces Potential Data Breach: Source Code and Credentials Allegedly Leaked On November 16, 2025, a threat actor known as 888 claimed responsibility for […]
Unremovable Spyware on Samsung Galaxy A & M Series Raises Privacy Concerns in MENA Region
Unremovable Spyware Found Pre-Installed on Samsung Galaxy Devices Recent investigations have revealed that certain Samsung Galaxy A and M series smartphones come with pre-installed software […]
XWiki RCE Vulnerability Exploited for Botnets, Cryptomining; CISA Issues Urgent Warning
Critical XWiki Vulnerability Exploited to Deploy Botnets and Cryptominers A critical remote code execution (RCE) vulnerability in XWiki, an open-source enterprise wiki platform, is being […]
US Unveils North Korean Cyber Scheme: 136 Firms Hit, $2.2M Stolen to Fund Weapons Program
North Korean Cyber Infiltration: Unmasking the $2.2 Million Scheme Targeting U.S. Companies In a significant crackdown on cybercrime, the U.S. Department of Justice has unveiled […]
APT28 Deploys NotDoor: Sophisticated Outlook Backdoor Challenges Detection and Security
Unveiling NotDoor: APT28’s Covert Outlook Backdoor and Detection Strategies In the ever-evolving landscape of cyber threats, the Russian state-sponsored group APT28, also known as Fancy […]