New Threat Targets Crypto Executives Using Voice Impersonation Tactics
A sophisticated social engineering method targeting the cryptocurrency industry has recently come to light, involving the use of professional voice impersonators to deceive high-ranking...
Open-Source AI Platform Automates Full-Scale Cyber Attacks
A new open-source AI framework is rapidly transforming how cyberattacks are carried out—by automating them. HexStrike AI, a publicly available multi-agent platform, enables attackers...
New Phishing Campaign Targets PayPal Users with Sophisticated Spoofing Tactics
A new phishing campaign is actively targeting PayPal users, using well-crafted emails designed to look like official communications from the payment platform. According to...
Your PDF Editor Might be Malware, According to New Advisory
The Dutch National Cyber Security Centre (NCSC) has issued a warning about an ongoing global campaign in which malware is being spread through software...
Autofill Vulnerability Puts Password Manager Users at Risk
A newly disclosed vulnerability affecting several widely used password managers has raised significant concerns about the security of autofill features. The flaw enables attackers...
WhatsApp Identifies Vulnerability Targeting iOS and macOS Devices
WhatsApp has recently addressed a security vulnerability affecting its messaging apps on Apple iOS and macOS platforms. The flaw, identified as CVE-2025-55177, could have...
IPv6 Could Be a Gateway for Cyberattackers on Windows Systems
A recently uncovered vulnerability in IPv6 could leave Windows networks exposed to attackers, even when the protocol is not actively in use. Security experts...
AI Web Builders Are Fueling a Rise in Phishing Sites, Say...
The rapid rise of AI-powered web development tools has made it easier than ever to create functional websites with minimal technical expertise. But recent...
Malicious Android App Uses Fake Antivirus Front to Spy on Russian...
A new Android malware strain disguised as a security tool is targeting Russian users, particularly within the business sector. Identified by cybersecurity researchers at...
Hackers Hijack Russian TV to Broadcast War Realities on Ukraine’s Independence...
In a bold cyber-attack timed for Ukraine’s Independence Day, pro-Ukrainian hackers redirected Russian television broadcasts, replacing regular programming with footage highlighting battlefield losses and...
INTERPOL Dismantles Thousands of Cybercrime Networks in Africa, Recovering Millions
An extensive international cybercrime operation coordinated by INTERPOL has led to the takedown of more than 11,000 malicious infrastructures across Africa and the arrest...
Russian Cyber Group Exploits Old Cisco Vulnerability for Strategic Espionage
A Russian state-linked cyber espionage group has been found actively exploiting a known vulnerability in Cisco networking equipment, despite a patch being available for...
Millions of PayPal Credential Allegedly Leaked on Hacker Forum
A post on a known data leak forum has raised concerns over a claimed dataset containing 15.8 million PayPal login credentials. According to the...
Pro-Russian Hacktivist Group Targets Ukrainian Government Sites Ahead of Trump-Zelensky Talks
A coordinated wave of cyberattacks hit several Ukrainian government websites earlier this week, hours before President Volodymyr Zelensky’s scheduled meeting with U.S. President Donald...
Widespread Use of Chinese-Made Surveillance Cameras Raises Security Concerns
A July report by the Irish Council for Civil Liberties (ICCL) has highlighted the ongoing use of Chinese-manufactured Hikvision surveillance cameras across numerous public...
Phishing Campaign Targets Marketing Professionals with Fake Netflix Job Offers
A newly uncovered phishing operation is targeting marketing and social media professionals by impersonating Netflix recruiters, with the ultimate goal of hijacking access to...
Passkeys Are Not Immune: New Research Highlights Critical Vulnerability
A recent investigation by Proofpoint security researchers has revealed a serious vulnerability in passkey-based authentication systems, raising concerns over their current level of protection...
U.S. Federal Court Filing System Allegedly Under Cyber Surveillance by Kremlin-Linked...
New details have emerged suggesting Russian-linked hackers may be behind a serious cyber intrusion into the U.S. federal judiciary's electronic case filing system. According...
Google Confirms Limited Cybersecurity Breach, Says Core Infrastructure Unaffected
Google has confirmed a data breach involving one of its Salesforce CRM instances, stating that while some business contact information was exposed, none of...
Fake Android Banking Apps Are Hijacking Devices and Draining Accounts in...
A wave of sophisticated mobile malware is targeting Android users in India by disguising itself as legitimate banking applications. According to a late-July report...
Malicious Shortcut Files Return as Effective Tool for Delivering Backdoors
A new wave of attacks is targeting Windows users with deceptive shortcut files designed to deliver the REMCOS backdoor and similar malware, according to...
North Korean Hackers Exploit Cloud Platforms in Sophisticated Crypto Theft Operations
A recently published threat report by Google Cloud has revealed a new cloud-based crypto theft technique linked to a North Korean cyber group. The...