MathWorks, the Massachusetts-based developer of the widely used MATLAB programming platform, has confirmed that a ransomware attack severely disrupted its services for over a week, affecting millions of engineers, scientists, and students worldwide. The company finally disclosed the nature of…
Category: Cyber Security News
Robinhood Ransomware Operator Charged for Attacking Government and Private Networks
An Iranian national has admitted his role in orchestrating one of the most damaging ransomware campaigns against U.S. infrastructure, marking a significant victory in international cybercrime prosecution. Sina Gholinejad, 37, pleaded guilty Tuesday in North Carolina federal court to charges…
APT36 & Sidecopy Hackers Attacks India’s Critical Infrastructure To Deploy Malware
A sophisticated cyber campaign dubbed Operation Sindoor has emerged as one of the most significant state-sponsored attacks targeting India’s critical infrastructure in 2025. The operation, orchestrated by Pakistan-aligned threat groups APT36 and Sidecopy, launched its initial assault on April 17,…
Securing Supply Chains – Mitigating Third-Party Risks
As global supply chains become increasingly complex and digitally interconnected, the risks posed by third-party vendors have moved from background concern to boardroom priority. In 2025, companies face a new reality: supply chain resilience is inseparable from third-party risk management,…
Hackers Mimic Popular Antivirus Site to Deliver VenomRAT & Steal Finance Data
Cybercriminals have launched a sophisticated malware campaign using a fake Bitdefender antivirus website to distribute a dangerous trio of malicious programs designed to steal financial data and maintain persistent access to victims’ computers. Security researchers have identified the fraudulent site…
Regulatory Compliance – Navigating Cybersecurity Laws
As digital threats escalate and technology rapidly evolves, regulatory compliance has become a defining challenge for organizations worldwide. In 2025, new and updated cybersecurity laws are reshaping how businesses protect data, manage risk, and demonstrate accountability. Navigating this complex legal…
Iranian Cyber Toufan Hackers Targeting Organizations To Steal Login Credentials
The digital battleground surrounding the Israel-Gaza conflict has intensified dramatically over the past year, with politically motivated threat actors launching sophisticated campaigns against Israeli organizations and their international partners. Among the most prominent of these groups is Cyber Toufan, an…
Cybersecurity Skills Gap – Training the Next Generation
The digital revolution has brought unprecedented connectivity and innovation, but it has also unleashed a wave of cyber threats that challenge the very fabric of our interconnected world. As organizations race to defend their data and infrastructure, a critical bottleneck…
CISA Releases ICS Advisories Covering Vulnerabilities & Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) released a significant Industrial Control Systems (ICS) advisory targeting a memory leak vulnerability in Johnson Controls’ iSTAR Configuration Utility (ICU) Tool, highlighting ongoing security challenges facing critical infrastructure sectors worldwide. This latest advisory…
INE Security Partners with RedTeam Hacker Academy to Elevate Cybersecurity Expertise in the Middle East
INE Security, a global cybersecurity training and certification provider, today announced a strategic partnership with RedTeam Hacker Academy through the signing of a Memorandum of Understanding (MoU). This agreement significantly accelerates INE Security’s expansion strategy in the Middle East and…
CISA Publishes SIEM & SOAR Implementation Guide Exclusively for Cybersecurity Executives
CISA, in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and multiple international partners, has released comprehensive guidance to help organizations effectively implement Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR)…
Top Tools for Enterprise Security Monitoring
As cyber threats grow in complexity and frequency, enterprise security monitoring has become a non-negotiable pillar of modern business defense. Data breaches can cost organizations millions, erode customer trust, and have long-term impacts on business performance. Enterprises invest in advanced…
Critical Firefox 0-Interaction libvpx Vulnerability Let Attackers Execute Arbitrary Code
Mozilla has released emergency security updates to address a critical vulnerability in Firefox that could allow attackers to execute arbitrary code on victims’ systems without any user interaction. The security flaw, tracked as CVE-2025-5262, was announced on May 27, 2025,…
Velvet Chollima APT Hackers Attacking Government Officials With Weaponized PDF
A sophisticated cyber espionage campaign attributed to the North Korean advanced persistent threat (APT) group Velvet Chollima has emerged, targeting South Korean government officials and organizations across multiple continents through weaponized PDF documents and innovative social engineering techniques. The Velvet…
Silver RAT Malware With New Anti-virus Bypass Techniques Executes Malicious Activities
A sophisticated new remote access trojan known as Silver RAT v1.0 has emerged in the cyberthreat landscape, demonstrating advanced anti-virus bypass capabilities and an array of destructive functionalities targeting Windows systems. First observed in the wild during November 2023, this…
Security Trends Analysis – Emerging Risks for 2025
As the digital landscape continues to evolve at breakneck speed, organizations worldwide are bracing for a new wave of security challenges in 2025. The convergence of artificial intelligence, geopolitical tensions, and quantum computing is reshaping the threat environment, demanding a…
Chrome Security Update – High-Severity Vulnerabilities Leads to Code Execution
Google has officially promoted Chrome 137 to the stable channel for Windows, Mac, and Linux platforms, marking a significant milestone in browser security and artificial intelligence integration. The Chrome team announced the release on May 27, 2025, with the update…
Researchers Dissected macOS ‘AppleProcessHub’ Stealer, TTPs & C2 Server Details Exposed
Security researchers have conducted an extensive analysis of a sophisticated macOS information stealer that emerged in mid-May 2025, revealing intricate attack mechanisms and command-and-control infrastructure details. The malware, dubbed ‘AppleProcessHub’ after its associated domain, represents a significant threat to macOS…
Zero Trust In The API Economy: New Frontiers In Identity-Based Access Control
APIs are the new highways of the internet. They’re fast, powerful, and make everything run until someone sneaks in and crashes the system. That’s the dilemma of the modern digital world: we’ve built an economy around APIs, but a lot…
Hackers Mimic OneNote Login to Steal Office365 & Outlook Credentials
A sophisticated phishing campaign targeting Italian and U.S. users through fake Microsoft OneNote login prompts designed to harvest Office 365 and Outlook credentials. The attack leverages legitimate cloud services and Telegram bots for data exfiltration, making detection significantly more challenging…