Weaponized SVG Files With Google Drive Links Attacking Gmail, Outlook & Dropbox Users
Cybercriminals have escalated their phishing tactics by leveraging Scalable Vector Graphics (SVG) files to bypass traditional anti-phishing and anti-spam defenses.
These attacks, which first became widespread late last year, have increased dramatically since January 2025,...
How to Track Evolving Cyber Threats in 2025
Cyber threats are natural enemies of any business trying to survive and thrive in the modern digital environment. Just like living beings, threats emerge and evolve. They change, mutate, adapt, and proliferate.
To withstand these...
Russian Hackers Attacking WhatsApp Users With Malicious QR Codes
Russian state-sponsored hacking group Star Blizzard has shifted its tactics to exploit WhatsApp users through malicious QR codes.
This marks a significant evolution in the group’s spear-phishing campaigns, which have historically targeted government officials, diplomats,...
Hackers Abusing Teams Chat For Remote Session & To Drop Black Basta Malware
In a concerning development, the notorious ransomware group Black Basta has been observed leveraging Microsoft Teams as part of a sophisticated social engineering campaign.
This new tactic, which combines email bombing with impersonation of...
Cl0p Ransomware Group Releases List of Victims Compromised Using Cleo Vulnerability
The notorious Cl0p ransomware group has published a list of companies compromised through vulnerabilities in Cleo's managed file transfer (MFT) software.
The announcement, made on the group’s dark web leak site, highlights the exploitation...
Top Sophisticated Cyber Security Threats of 2024
As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape.
ANY.RUN, a leading interactive malware analysis platform, has released its quarterly report, shedding...
CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks
CoinLurker is a sophisticated data-stealing malware that has revolutionized fake update campaigns. Written in the Go programming language, CoinLurker incorporates advanced obfuscation and anti-analysis techniques, enabling it to evade detection and execute stealthy cyberattacks.
According...
WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies
A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team.
The...
Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data
Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services giant.
Brain Cipher is a ransomware group that emerged in June...
Researchers Uncover Malicious Use Of Cobalt Strike Servers In Cyber Attacks
Cybersecurity researchers have identified a cluster of servers exploiting the latest version of Cobalt Strike, a legitimate penetration testing tool, for malicious purposes.
The discovery highlights the ongoing misuse of cybersecurity tools by threat actors...