News

Control Room - Screens - Worl Map - Hackers - Personnel

This week’s cybersecurity stories cover a wide range of incidents. We saw fresh software flaws with global impact, and data…

|
Published on September 27, 2025
SVG Download - Loader Pipeline - Shadow Hackers

Novel attack vector: A phishing campaign is using malicious SVG files disguised as mailsv from the Ukraine Police to initiate…

|
Published on September 26, 2025
Retail - Malware - GitHub - OneDrive - Googele Drive

Accelerated GenAI adoption: 95% of retail organizations now use GenAI apps, a significant increase from 73% in the previous year.…

|
Published on September 26, 2025
Bank - Rupee - Servers - Transactions - People

Significant exposure: An unsecured cloud server exposed 273,000 PDF documents containing sensitive bank transfer details of Indian customers. Sensitive information…

|
Published on September 26, 2025
CISCO - Vulnerability - Personnel - Hacker

Emergency directive: CISA has issued an Emergency Directive, mandating federal agencies to mitigate vulnerabilities in Cisco devices. Critical vulnerabilities: Cisco…

|
Published on September 26, 2025
Global VPN Day of Action to Highlight Growing Threat of VPN Bans

Global VPN Day of Action: Campaign by Fight for the Future raises awareness against worldwide VPN restrictions. Windscribe’s Role: Provider…

|
Published on September 25, 2025
Salesforce - Laptop - CRM Folders - AI - Ransomware - Laptop

Critical vulnerability: ForcedLeak, a critical severity (CVSS 9.4) vulnerability chain in Salesforce Agentforce, was discovered Attack method: The vulnerability enabled…

|
Published on September 25, 2025
Proposed Michigan Anti-Porn Law Could Also Ban VPNs

Bill Scope: Proposal bans porn, depictions of transgender people, and use of circumvention tools like VPNs. Unprecedented Move: Unlike age-verification…

|
Published on September 25, 2025
Preschool - Laptop - Ransomware

Preschool targeted: The Radiant Group ransomware gang has claimed responsibility for a cyberattack on Kido International Preschool & Daycare. Highly…

|
Published on September 25, 2025
World Map - Network - Money - Personnel - Crack Down

Massive recovery: Operation HAECHI VI, spanning across 40 countries, recovered $439 million in illicit funds and assets. Global cooperation: The…

|
Published on September 25, 2025
Police - Arrest - Airport - People

Suspect arrested: The UK's NCA arrested a man in his forties in connection with the ransomware attack on Collins Aerospace.…

|
Published on September 25, 2025
Key - Encryption - Backdoor - Screen - Hacker - IceID

New malware discovered: A new malware family named YiBackdoor was first observed in June 2025. Significant code overlap: The malware…

|
Published on September 24, 2025
HVAC - Hospial - Doctors - Patient - Ransomware

Pervasive vulnerabilities: 75% of organizations have Building Management Systems with known exploited vulnerabilities, including hospitals. Internet exposure: More than half…

|
Published on September 24, 2025
Sim Boxes - Secret Service - Personnel - US

Massive network uncovered: A network of over 300 SIM servers and 100,000 SIM cards in the New York tristate area…

|
Published on September 24, 2025
IPVanish Expands Support for Essential Everyday Website Access

Website Access: IPVanish adds support for postal, ticketing, and banking portals to prevent VPN-related blocks. User Frustration: Updates reduce false…

|
Published on September 24, 2025
WordPress - Hacker - Profile - Dashboard - Lock

Stealthy persistence: Malware is being disguised as fake plugins to create hidden administrator accounts in WordPress. Layered attack: Attackers are…

|
Published on September 24, 2025
Proton VPN Clears Fourth Annual Independent No-Logs Audit

Audit Success: Proton VPN passed its fourth consecutive independent no-logs audit by Securitum. No Data Stored: Audit confirmed no user…

|
Published on September 24, 2025
Network - Employees - Web

Hardware vulnerabilities up: Bugcrowd's 2025 report reveals a significant 88% increase in hardware vulnerability exploits. Network flaws double: The analysis…

|
Published on September 23, 2025
USB - Cracked Digital Identity - Email - Phishing

Identity under siege: Attackers are increasingly targeting identity systems, with intrusions involving layered persistence methods. Phishing evolves: Over 70% of…

|
Published on September 23, 2025
Hacker - Police - MGM - Caesars

Suspect surrenders: A suspect, allegedly a member of the Scattered Spider cybercrime group, surrendered to the authorities. Serious charges: The…

|
Published on September 23, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: