A cybercrime operation sells a malicious remote access trojan disguised as a legitimate remote management tool, using a fraudulent Extended…
Read More »Proofpoint
Entity category: organization
The TA584 threat actor has significantly escalated operations, tripling campaign volume in late 2025 and expanding its geographic targeting to…
Read More »A sophisticated email scam exploits a legitimate Microsoft address (no-reply-powerbi@microsoft.com) to send fake Power BI subscription invoices, tricking users into…
Read More »Attackers are exploiting Microsoft's device code authorization flow to bypass multi-factor authentication, tricking users into granting account access via fraudulent…
Read More »An international law enforcement effort led by Europol and Eurojust dismantled over 1,000 servers used by major malware families like…
Read More »DanaBot malware has re-emerged with a new version (v669) after a six-month hiatus, now utilizing Tor-based infrastructure and cryptocurrency addresses…
Read More »Cybercriminals are using remote monitoring and management (RMM) tools to hijack freight shipments and steal cargo by posing as legitimate…
Read More »Cybercriminals exploit internal OAuth applications to create persistent backdoors in corporate cloud systems, bypassing security measures like password resets and…
Read More »TA585 is a sophisticated cybercriminal group known for its fully autonomous infrastructure, managing its own phishing campaigns, malware deployment, and…
Read More »Nearly all U.S. healthcare organizations experienced multiple cyberattacks in the past year, primarily involving ransomware, cloud account takeovers, and supply…
Read More »The rise of the agentic workspace, where humans and AI agents collaborate, introduces new security challenges that require a fresh,…
Read More »Hush Security has raised $11 million in seed funding to advance its policy-driven, just-in-time access model for machine-to-machine communication, replacing…
Read More »A new spyware called Stealerium automates the capture of compromising images by monitoring online activity for adult content keywords and…
Read More »Generative AI is viewed by most CISOs as a significant security risk, leading organizations to adopt structured guardrails for controlled…
Read More »ClickFix attacks, exploiting human psychology through deceptive error messages, surged by 517% in 2025, becoming the second most prevalent cyber…
Read More »Microsoft patched 66 security flaws, including a zero-day exploit (CVE-2025-33053), while Mirai botnets targeted unpatched Wazuh servers via a critical…
Read More »Security experts warn of a surge in account takeover attacks targeting Microsoft Entra ID, using the TeamFiltration framework to brute-force…
Read More »















