Tag: Cyber Security News

Linux 6.15 Released with Several New Features & Improvements

Linus Torvalds officially announced the stable release of the Linux kernel 6.15 on May 25, 2025. This release marked a significant milestone in open-source development, with groundbreaking Rust integration, substantial performance improvements, and extensive hardware support expansion.  This release introduces…

Russian Cybercriminal Charged in $24 Million Qakbot Ransomware Scheme

The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov, 48, for allegedly orchestrating one of the world’s most sophisticated malware operations that infected over 700,000 computers globally and facilitated devastating ransomware attacks.  The Moscow-based…

GenAI Assistant DIANNA Uncovering New Obfuscated Malware

The cybersecurity landscape witnessed a significant milestone this February with the emergence of BypassERWDirectSyscallShellcodeLoader, a sophisticated malware specimen that represents the first documented case of large language model-generated malicious code being analyzed by an artificial intelligence security assistant. This groundbreaking…

Hackers Attacking macOS Users With Fake Ledger Apps to Deploy Malware

Cybercriminals are increasingly targeting cryptocurrency users through sophisticated malware campaigns that exploit the trust placed in cold wallet management applications. Since August 2024, threat actors have been distributing malicious clones of Ledger Live, the widely-used application for managing cryptocurrency through…

New Formjacking Malware Attacking E-Commerce Pages to Steal Credit Card Data

Cybersecurity researchers have uncovered a sophisticated new formjacking malware campaign targeting WooCommerce-powered e-commerce websites, representing a significant evolution in credit card skimming attacks. This advanced threat demonstrates unprecedented stealth capabilities, carefully integrating fake payment forms into legitimate checkout processes while…

Researchers Uncovered Infrastructure & TTPs Used by ALCATRAZ Malware

Security researchers have identified a sophisticated malware campaign utilizing the ALCATRAZ obfuscator, an open-source tool originally developed for the game hacking community that has now been weaponized by cybercriminals and advanced persistent threat groups. The malware, dubbed DOUBLELOADER, has been…

2025 Cybersecurity Trends – Key Threats and Solutions

Artificial intelligence, sophisticated ransomware operations, and evolving geopolitical tensions are dramatically reshaping the cybersecurity landscape in 2025. With over 30,000 vulnerabilities disclosed last year, a 17% increase from previous figures, organizations face unprecedented challenges in securing their digital assets. As…

Enterprise Security Solutions – Building a Resilient Defense

In today’s hyper-connected world, enterprise security is no longer a technical afterthought but a boardroom priority. As cyberattacks grow in frequency and sophistication, organizations are under increasing pressure to protect sensitive data, maintain regulatory compliance, and ensure business continuity. The…

TAG-110 Hackers Weaponize Word Templates for Targeted Attacks

A sophisticated cyber-espionage campaign has emerged targeting Tajikistan’s government institutions through weaponized Microsoft Word templates, marking a significant tactical evolution by the Russia-aligned threat group TAG-110. The campaign, which unfolded between January and February 2025, represents a departure from the…

iPhone Phishing Defense – Recognizing and Blocking Attacks

As mobile devices become increasingly central to daily life, cybercriminals are refining their tactics to exploit vulnerabilities in Apple’s iMessage platform. Recent reports reveal a surge in phishing campaigns that bypass Apple’s built-in security measures by manipulating user behavior, underscoring…

Protecting iPhones from Spyware – Tools and Tips

iPhones have become integral to daily life, so their security has never been more critical. While Apple’s iOS is renowned for its robust security architecture, spyware threats are evolving, and no device is entirely immune. Recent incidents, including high-profile cases…