Blogs
-
Read moreA sophisticated OneDrive spearphishing campaign targets corporate executives with fake HR emails and Microsoft Office 365 login pages to steal credentials. Learn how to recognize and prevent this threat.
-
Read moreDiscover how the AI-driven ransomware PromptLock leverages OpenAI’s gpt-oss:20b model to generate sophisticated, variable malware code. Learn about detection challenges and mitigation strategies for this emerging cybersecurity threat.
-
Read moreBeware of a new WhatsApp scam where hackers hijack accounts via fake Facebook login links and device linking. Learn how to protect your chats, contacts, and media from takeover.
-
Read moreHackers are exploiting macOS security features like Keychain, TCC, SIP, and Gatekeeper to spread malware. Learn how to detect and prevent these advanced macOS attacks.
-
Read moreBeware of fake calls from scammers posing as the Data Protection Board of India officials. Learn how to spot these frauds and protect your personal information from social engineering attacks.
-
Read moreIn August 2025, Zscaler disclosed a major Salesforce breach involving OAuth token compromise by threat group UNC6395, impacting over 700 companies worldwide. Learn how to protect your SaaS environment.
-
Read moreResearchers found 8 malicious NPM packages targeting Windows Chrome users with obfuscated code to steal passwords, credit cards, and crypto wallets. Learn more.
-
Read moreLearn about the critical Sangoma FreePBX authentication bypass vulnerability that risks remote code execution and how to protect your system.
-
Read moreDiscover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
-
Read moreDiscover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.
-
Read moreDiscover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
-
Read moreDiscover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
-
Read moreExplore how the Underground ransomware gang is enhancing tactics against global organizations, using advanced encryption and targeted attacks.
-
Read moreDiscover how the Salesloft OAuth breach compromised Salesforce customer data through the Drift AI chat agent, affecting over 700 organizations.
-
Posted: August 27, 2025Views: 115Read moreDiscover how fake loan apps in India are trapping users in harassment and blackmail. Learn about the global network behind these predatory practices and the ongoing regulatory challenges.
-
Read moreDiscover how a malicious Go module masquerading as an SSH brute-force tool exfiltrates credentials to a Telegram bot. Learn about its key features and the threat it poses.
-
Read moreZimperium’s zLabs has uncovered a new variant of the Hook Android banking trojan, featuring ransomware-style overlays and advanced credential theft tactics. Learn about its key features and technical insights.
-
Read moreAdversaries are misusing AI-powered website builders like Lovable to create malicious infrastructure for malware distribution and credential phishing. Discover the emerging threats and how organizations can protect themselves.
-
Read moreFrench retailer Auchan has announced a cyberattack that compromised loyalty account information for hundreds of thousands of customers. Learn about the breach, its implications, and the company's response.
-
Read moreA large-scale scanning campaign is targeting Microsoft Remote Desktop Protocol (RDP) services, utilizing over 30,000 unique IP addresses. Learn about the attack's methodology and implications for credential-based attacks.