Risk & Resilience

LastPass 2022 Breach Vaults Still Drained As Weak Passwords Exposed TRM Labs

TRM Labs finds stolen encrypted vaults from the 2022 LastPass breach are still being cracked in 2025, enabling crypto theft linked to Russian cybercriminal exchanges.

New MacSync macOS Stealer Variant Uses Signed Apps To Bypass Apple Security

Researchers uncover a new MacSync macOS stealer variant distributed via a signed and notarized Swift app, abusing Apple trust mechanisms to evade Gatekeeper and deliver malware.

Nomani Investment Scam Sees 62% Increase As Cybercriminals Expand Social Media Campaigns

Nomani fraudulent investment scheme surged 62% in 2025, leveraging AI-generated deepfakes and social media ads to target users globally. ESET highlights evolving tactics and law enforcement impact.

2025 Data Breaches Highlight Rising Cyber Risks For Small And Medium Businesses

Small and medium-sized businesses faced increased cyberattacks in 2025, with millions of records exposed. Experts advise stronger authentication, access control, and secure data storage to reduce breach risks in 2026.

Iranian Infy APT Group Resurfaces With Expanded Malware Operations After Years Of Silence

Researchers uncover renewed activity from Iranian threat actor Infy, also known as Prince of Persia, revealing updated malware, resilient C2 infrastructure, and expanded global targeting.

CountLoader Malware Campaign Exploits Cracked Software Sites As New Stealthy Loader Evolves

Researchers uncover an evolving CountLoader malware campaign using cracked software sites and multistage loaders, alongside GachiLoader spreading through compromised YouTube accounts.

Kimwolf Botnet Infects 1.8 Million Smart Devices With DDoS Capabilities

QiAnXin XLab reports Kimwolf botnet has compromised 1.8 million Android-based TVs, set-top boxes, and tablets, executing billions of DDoS commands and leveraging ENS infrastructure.

GhostPoster Malware Campaign Exploits Firefox Add-Ons to Hijack Browsers

GhostPoster malware used 17 Mozilla Firefox add-ons to execute affiliate link hijacking, ad fraud, tracking injection, and remote code execution, affecting over 50,000 users.

CISA Flags Actively Exploited Sierra Wireless Router Flaw In KEV Catalog

CISA adds CVE-2018-4063 affecting Sierra Wireless AirLink routers to its KEV catalog after reports of active exploitation targeting industrial and OT environments.

Urban VPN Chrome Extension Found Collecting AI Chat Prompts From Millions Of Users

Researchers uncover that Urban VPN browser extension silently collected AI chatbot prompts and responses from millions of users across ChatGPT, Claude, Copilot, Gemini, and other platforms.

React2Shell Exploitation Expands As New Malware Families Target Vulnerable Systems

React2Shell vulnerability continues to face extensive exploitation, with multiple malware families and automated attack activity targeting organizations worldwide.

Gladinet CentreStack And Triofox Flaw Actively Exploited Through Hard Coded Cryptographic Keys

Huntress reports active exploitation of a newly uncovered Gladinet CentreStack and Triofox vulnerability linked to hard coded cryptographic keys, enabling unauthorized access and remote code execution across affected systems.

Recent articles

spot_img