China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure
Chinese officials have implicitly acknowledged responsibility for a series of sophisticated cyber intrusions targeting critical U.S. infrastructure.
During a high-level meeting in Geneva with American officials, representatives from China's Ministry of Foreign Affairs indirectly linked...
APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises
The APT32 (OceanLotus) has launched a novel campaign weaponizing GitHub repositories to distribute malware to cybersecurity researchers and enterprises.
This operation represents a strategic shift from the group’s historical focus on Southeast Asian government and...
10 Best IT Asset Management Tools In 2025
IT asset management (ITAM) software has become essential for businesses to efficiently track, manage, and optimize their hardware, software, and cloud resources.
As we approach 2025, the landscape of ITAM tools continues to evolve, offering...
Daisy Cloud Hacker Group Exposed 30K Login Credentials Across a Wide Range of Services
A significant cybersecurity breach has been uncovered involving the hacker group known as "Daisy Cloud," which has exposed more than 30,000 login credentials spanning numerous digital services.
The threat actors have been operating a sophisticated...
Weaponized Google Ads Attacking DeepSeek Users to Deliver Malware
Cybercriminals have launched a sophisticated attack campaign leveraging Google's sponsored search results to target users searching for DeepSeek, the increasingly popular AI platform.
The attack uses convincingly crafted fake advertisements that appear at the top...
Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows & Android Users
Cybersecurity researchers have uncovered a sophisticated attack campaign leveraging a fraudulent website that impersonates the Indian Post Office to deliver malware to both Windows and Android users.
The fake website, hosted at postindiasite, employs device...
Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data
A sophisticated cyber espionage campaign has been uncovered where threat actors are masquerading as recruiters to target job seekers and employees of specific organizations.
The attackers send phishing emails disguised as job opportunities from legitimate...
23,000 GitHub Repositories Targeted In Supply Chain Attack
In a massive security breach discovered this week, approximately 23,000 GitHub repositories have been compromised in what security experts are calling one of the largest supply chain attacks to date.
The attackers exploited vulnerabilities in...
Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer
A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows and Linux systems.
The attack leverages exposed instances of Jupyter Notebook, an interactive application widely used by data scientists containing...
What is QR Code Phishing? (Quishing) – Attack & Prevention Guide in 2025
QR code Phishing, or "Quishing," is a cyber threat that exploits the widespread use of QR (Quick Response) codes in phishing attacks.
Quishing takes advantage of the recent high-use volume and increasing popularity of QR...