SIEM as a Service
Home Cyber Threat News

Cyber Threat News

Stay informed about the latest cybersecurity challenges with our Cyber Threat News category. From ransomware attacks and phishing scams to advanced persistent threats (APTs), we provide up-to-date insights on the most pressing cyber risks affecting individuals and businesses.

Our expert analyses cover how these threats evolve, who they target, and what steps you can take to safeguard your data. Whether it’s breaking news on global cyber incidents or trends shaping the future of cybersecurity, you’ll find it here.

SVG Files With Google Drive Links

Weaponized SVG Files With Google Drive Links Attacking Gmail, Outlook & Dropbox Users

Cybercriminals have escalated their phishing tactics by leveraging Scalable Vector Graphics (SVG) files to bypass traditional anti-phishing and anti-spam defenses.  These attacks, which first became widespread late last year, have increased dramatically since January 2025,...
Track Evolving Cyber Threats

How to Track Evolving Cyber Threats in 2025

Cyber threats are natural enemies of any business trying to survive and thrive in the modern digital environment. Just like living beings, threats emerge and evolve. They change, mutate, adapt, and proliferate. To withstand these...
Russian Hackers WhatsApp QR codes

Russian Hackers Attacking WhatsApp Users With Malicious QR Codes

Russian state-sponsored hacking group Star Blizzard has shifted its tactics to exploit WhatsApp users through malicious QR codes. This marks a significant evolution in the group’s spear-phishing campaigns, which have historically targeted government officials, diplomats,...

Hackers Abusing Teams Chat For Remote Session & To Drop Black Basta Malware

In a concerning development, the notorious ransomware group Black Basta has been observed leveraging Microsoft Teams as part of a sophisticated social engineering campaign. This new tactic, which combines email bombing with impersonation of...

Cl0p Ransomware Group Releases List of Victims Compromised Using Cleo Vulnerability

The notorious Cl0p ransomware group has published a list of companies compromised through vulnerabilities in Cleo's managed file transfer (MFT) software. The announcement, made on the group’s dark web leak site, highlights the exploitation...
Cyber Threats of 2024

Top Sophisticated Cyber Security Threats of 2024

As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape. ANY.RUN, a leading interactive malware analysis platform, has released its quarterly report, shedding...
CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks

CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks

CoinLurker is a sophisticated data-stealing malware that has revolutionized fake update campaigns. Written in the Go programming language, CoinLurker incorporates advanced obfuscation and anti-analysis techniques, enabling it to evade detection and execute stealthy cyberattacks. According...
WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team. The...
Deloitte Hacked

Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data

Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services giant. Brain Cipher is a ransomware group that emerged in June...
Researchers Uncover Malicious Use Of Cobalt Strike Servers In Cyber Attacks

Researchers Uncover Malicious Use Of Cobalt Strike Servers In Cyber Attacks

Cybersecurity researchers have identified a cluster of servers exploiting the latest version of Cobalt Strike, a legitimate penetration testing tool, for malicious purposes. The discovery highlights the ongoing misuse of cybersecurity tools by threat actors...
SIEM as a Service

Recent Posts