Cyber News

Monero Mining via H2Miner – Targeting Linux, Windows, and Containers

FortiGuard Labs has uncovered a sophisticated crypto mining campaign that demonstrates the evolving threat landscape of 2025. The FortiCNAPP team…

10 months ago

Massistant – Uncovering SMS, Media, and GPS Data with Chinese Mobile Forensics Tool

Researchers at Lookout Threat Lab have discovered a sophisticated mobile forensics application named Massistant, used by Chinese law enforcement to…

10 months ago

UNG0002 Actors Leverage Weaponized LNK Files Through ClickFix Fake CAPTCHA Pages

Cybersecurity researchers at Seqrite Labs have identified a sophisticated threat group, designated UNG0002, also known as Unknown Group 0002, which…

10 months ago

PyPI Cracks Down on Inbox.ru Domains After Identifying 1,500+ Fake Project Uploads

The Python Package Index (PyPI) has banned the inbox.ru email domain following a sophisticated spam campaign that created over 250…

10 months ago

AI-Powered Email Attacks – Iranian Threat Groups Targeting Cybersecurity Experts and Academics

Iranian state-sponsored cyber groups have significantly enhanced their offensive capabilities in the aftermath of June 2025 military strikes, deploying sophisticated…

10 months ago

OVERSTEP Ransomware Deployed Through Exploited 0-Day RCE Vulnerability in SonicWall SMA Devices

Google Threat Intelligence Group (GTIG) has uncovered a sophisticated campaign by the financially motivated threat actor UNC6148, targeting fully patched…

10 months ago

Exploiting SVG Files – How Threat Actors Are Using Them to Deliver Malicious JavaScript

Cybersecurity researchers have uncovered a sophisticated new attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to…

10 months ago

28+ New Packages Used by Threat Actors to Spread Protestware

Socket's Threat Research Team has uncovered a significant supply chain security incident involving protestware that has spread across at least…

10 months ago

Exploiting Microsoft Teams – A New Method for Deploying Matanbuchus Ransomware

Cybersecurity researchers have identified a sophisticated new attack campaign in which threat actors are exploiting Microsoft Teams to deploy the…

10 months ago

Critical Vulnerabilities in Sophos Intercept X for Windows Allow Arbitrary Code Execution

Sophos has disclosed three high-severity security vulnerabilities in its Intercept X for Windows endpoint protection software that could allow local…

10 months ago