cyber security

New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages

A sophisticated spearphishing campaign has emerged targeting humanitarian organizations and Ukrainian government agencies, leveraging weaponized PDF attachments and fake Cloudflare…

11 hours ago

Amazon Uncovers Root Cause of Major AWS Outage That Brokes The Internet

Amazon Web Services (AWS), the backbone for countless websites and services, faced a severe outage last weekend that disrupted operations…

11 hours ago

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Email phishing attacks have reached a critical inflection point in 2025, as threat actors deploy increasingly sophisticated evasion techniques to…

13 hours ago

Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability

Microsoft has rolled out an out-of-band emergency patch for a remote code execution (RCE) vulnerability affecting the Windows Server Update…

13 hours ago

Toys “R” Us Canada Confirms Data Breach – Customers Personal Data Stolen

Toys "R" Us Canada has alerted customers to a significant data breach that potentially exposed their personal information, marking another…

14 hours ago

New Fileless Remcos Attacks Bypassing EDRs Malicious Code into RMClient

Remcos, a commercial remote access tool marketed as legitimate surveillance software, has become the leading infostealer in malware campaigns during…

14 hours ago

HP OneAgent Update Brokes Trust And Disconnect Devices From Entra ID

The HP OneAgent software update has disconnected Windows devices from Microsoft Entra ID. As a result, users can no longer…

14 hours ago

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob Storage containers,…

14 hours ago

New PDF Tool to Detect Malicious PDF Using PDF Object Hashing Technique

A new open-source tool called PDF Object Hashing is designed to detect malicious PDFs by analyzing their structural "fingerprints." Released…

14 hours ago

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels

A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a…

15 hours ago