Chinese Ambassador to Russia Zhang Hanhui has officially announced Beijing’s intention to strengthen strategic cooperation with Moscow in cybersecurity, signaling a significant expansion of the two nations’ digital partnership. The announcement comes as both countries seek to counter what they…
Tag: Cyber Security News
Beware of Weaponized Amazon Gift Cards That Steals Microsoft Credentials
Cybercriminals have launched a sophisticated phishing campaign exploiting the popularity of digital gift cards to steal Microsoft credentials from unsuspecting users. This new attack vector disguises malicious links within seemingly legitimate Amazon gift card emails, creating a perfect social engineering…
Security Teams Shrink as Automation Rises—Is This the Future?
In today’s fast-evolving cybersecurity landscape, a significant shift is taking place. As organizations adopt automation to manage traditional security tasks, security teams are noticeably shrinking; automation trims security teams. This shift represents more than cost-cutting; it reflects a fundamental reimagining…
Harvest Ransomware Attack – Details of the Data Breach Released
Harvest SAS, a leading French fintech company specializing in wealth management software, has fallen victim to a sophisticated ransomware attack. The ransomware attack was first detected on February 27, 2025, but Harvest publicly disclosed the incident on April 10, 2025,…
How to Prepare for Your Next Cybersecurity Audit
In today’s hyper-connected business world, cybersecurity audits are not just a regulatory requirement but a vital component of organizational risk management and digital trust. The frequency and sophistication of cyber threats are rising, as are customers’, partners’, and regulators’ expectations.…
Ghost Ransomware Breaching Organizations in Over 70+ Countries
Ghost Ransomware, also known as Cring, has emerged as a formidable cyber threat targeting organizations across more than 70 countries. Since its first appearance in 2021, this malware variant has rapidly evolved into one of the most dangerous ransomware strains,…
CISA Warns of SonicWall Command Injection Vulnerability Exploited in Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical SonicWall vulnerability that is actively being exploited by threat actors. On April 16, 2025, CISA added CVE-2021-20035, a command injection vulnerability affecting SonicWall SMA100 appliances,…
Google Blocks 5 Billion Malicious Ads & Suspend 700,000+ Offending Advertiser
Google revealed a significant crackdown on malicious advertising activity across its platforms, blocking more than 5.1 billion bad ads and suspending upwards of 700,000 advertiser accounts involved in policy violations and scams. Google’s ability to detect and prevent malicious ads…
Researchers Uncovered Gamaredon’s PteroLNK VBScript Malware Infrastructure & TTP’s
A sophisticated malware campaign attributed to the Russia-linked Gamaredon threat group has been actively targeting Ukrainian entities since late 2024, according to new research published on April 16, 2025. Samples of the Pterodo malware family were identified on public malware…
Mustang Panda Employs Using Weaponized RAR Archives to Install New ToneShell Malware
Security researchers have uncovered new malicious activities attributed to Mustang Panda, a China-sponsored espionage group known for targeting government entities, military organizations, and non-governmental organizations primarily in East Asia and Europe. The threat actor has been observed utilizing weaponized RAR…
Windows 11 24H2 Update Bug Triggers BSOD Error – Emergency Fix Released
Microsoft has officially confirmed a major bug in its recent Windows 11 24H2 updates that is causing widespread Blue Screen of Death (BSOD) crashes, displaying the stop error code “SECURE_KERNEL_ERROR” (0x18B). The issue, first reported by Windows Latest in March…
Cisco Webex Vulnerability Allows Code Execution via Weaponized Meeting Links
A critical vulnerability in Cisco Webex App that could allow attackers to execute malicious code on target systems through specially crafted meeting invitation links. The high-severity flaw, tracked as CVE-2025-20236, has prompted Cisco to release emergency patches for affected versions…
2 Apple Iphone Zero-Day Vulnerabilities Actively Exploited in Extremely Sophisticated Attacks
Apple has released iOS 18.4.1 and iPadOS 18.4.1 to address two critical zero-day vulnerabilities that were actively exploited in highly targeted, sophisticated attacks against specific individuals iPhone. The vulnerabilities, identified in the CoreAudio and RPAC components, could allow attackers to…
Server-Side Phishing Attacks Employees & Member Portals to Steal Login Credentials
Credential theft through phishing remains one of the most reliable methods for gaining unauthorized access to enterprise environments. A sophisticated phishing campaign has been identified targeting employee and member portals of major organizations including Aramark, Highmark, and various healthcare providers.…
Interlock Ransomware Employs Multi-Stage Attack Via Legitimate Websites to Deliver Malicious Browser Updates
Cybersecurity experts have identified a sophisticated ransomware threat known as Interlock, which has been quietly expanding its operations since its first appearance in September 2024. This malware employs an elaborate multi-stage attack chain, beginning with the compromise of legitimate websites…
Jira Down – Atlassian Jira Outage Disrupts Dashboard Access for Users Globally
Atlassian, the company behind Jira, a leading project management and issue-tracking platform, is grappling with a significant service disruption that has left users unable to load certain Dashboard widgets. The outage, affecting Jira Work Management, Jira Service Management, and Jira…
Researchers Deanonymized Medusa Ransomware Group’s Onion Site
Researchers have uncovered the true identity of servers hosting one of the most notorious ransomware operations active today. The Medusa Ransomware Group, which has operated with relative anonymity through Tor hidden services, has had its cover blown through a sophisticated…
Beware of Online PDF Converters That Tricks Users to Install Password Stealing Malware
Cybercriminals have launched a sophisticated malware campaign leveraging fake PDF-to-DOCX converter websites that mimic the popular legitimate service PDFCandy. The malicious websites, including domains such as candyxpdf[.]com and candyconverterpdf[.]com, deploy an elaborate social engineering tactic designed to harvest sensitive information…
New Windows Task Scheduler Vulnerabilities Allows Command Execution as Admin User
Critical Windows Task Scheduler involving schtasks.exe binary, which could enable malicious actors to execute commands with SYSTEM-level privileges, bypassing User Account Control (UAC) prompts and erasing audit logs. These flaws significantly elevate the threat landscape for Windows environments, posing risks…
Hackers Attacking Investors Via Fraud Networks to Steal Financial Data
A sophisticated cybercriminal campaign targeting Indian investors through fraudulent stock and cryptocurrency schemes has escalated, with hackers leveraging social engineering, fake mobile applications, and compromised government websites to steal financial data. These attacks exploit the rapid growth of digital investment…