Risk & Resilience

Microsoft Uncovers ClickFix Campaign Using Windows Terminal To Deploy Lumma Stealer Malware

Microsoft reports a ClickFix social engineering campaign abusing Windows Terminal to execute malicious commands and deploy Lumma Stealer targeting browser credentials.

AI Driven SOC Investigations Show Deeper Threat Detection Beyond Alert Triage

Real world investigations show how AI powered SOC platforms can conduct multi source threat analysis, helping security teams detect credential compromise and advanced phishing attacks faster.

Malicious Laravel Packages On Packagist Deploy Cross Platform Remote Access Trojan

Security researchers discovered malicious Laravel related packages on Packagist that deploy a cross platform remote access trojan affecting Windows, macOS, and Linux systems.

Europol Led Operation Dismantles Tycoon 2FA Phishing Service Linked To 64,000 Attacks

Europol and cybersecurity partners dismantled Tycoon 2FA, a phishing as a service toolkit tied to more than 64,000 attacks and nearly 100,000 affected organizations worldwide.

Google Confirms CVE 2026 21385 In Qualcomm Android Component Under Active Exploitation

Google confirms active exploitation of CVE 2026 21385, a high severity Qualcomm graphics component flaw, as part of Android March 2026 security updates addressing 129 vulnerabilities.

China Linked Amaranth Dragon Exploits WinRAR Flaw In Southeast Asia Espionage Campaigns

China linked Amaranth Dragon exploited a WinRAR vulnerability in targeted espionage campaigns across Southeast Asia, with overlaps tied to APT41 and parallel PlugX operations by Mustang Panda.

Malicious Go Crypto Module Steals Passwords And Deploys Rekoobe Backdoor On Linux Systems

Researchers uncover a malicious Go module impersonating golang.org/x/crypto that steals terminal passwords, installs SSH persistence, and deploys the Rekoobe Linux backdoor.

Thousands Of Public Google Cloud API Keys Exposed With Gemini Access After API Enablement

Researchers have uncovered nearly 3,000 publicly exposed Google Cloud API keys that gained unintended access to Gemini endpoints after API enablement, raising concerns over data exposure and unexpected billing charges.

Software Developer Accidentally Gains Control Of Thousands Of DJI Robot Vacuums Exposing Security Vulnerability

A software developer accidentally accessed and controlled about 7,000 DJI Romo robot vacuums worldwide while trying to connect his own device to a PlayStation controller, exposing serious security vulnerabilities in smart home devices.

UAT-10027 Campaign Targets U.S. Education And Healthcare Sectors Using Dohdoor Backdoor

Cisco Talos tracks UAT-10027, a malicious campaign targeting U.S. education and healthcare sectors with Dohdoor backdoor using DNS over HTTPS for stealthy command-and-control.

Google Disrupts UNC2814 GRIDTIDE Campaign Targeting 53 Organizations Across 42 Countries

Google, in collaboration with industry partners, has disrupted the infrastructure of UNC2814, a suspected China-linked cyber espionage group using GRIDTIDE malware to target 53 organizations across 42 countries, supporting affected organizations and cutting off malicious access.

Lazarus Group Deploys Medusa Ransomware In Middle East And U.S. Healthcare Attacks

North Korea linked Lazarus Group has been observed using Medusa ransomware in attacks targeting a Middle Eastern entity and a U.S. healthcare organization, signaling a tactical shift toward ransomware as a service operations.

Recent articles

spot_img