Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

06/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm,

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

06/03/2026 0 Comments 0 tags

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants. The activity is

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

06/03/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

06/03/2026 0 Comments 0 tags

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

06/03/2026 0 Comments 0 tags

A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants.

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

06/03/2026 0 Comments 0 tags

New research from Broadcom’s Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies’ networks, including banks, airports, non-profit,

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

06/03/2026 0 Comments 0 tags

Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale. Risk-based cybersecurity is the foundation of that model. When

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

05/03/2026 0 Comments 0 tags

Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity,

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

05/03/2026 0 Comments 0 tags

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild. The vulnerabilities in question are listed below –

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

05/03/2026 0 Comments 0 tags

Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they