Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises

10/09/2025 0 Comments 0 tags

Phishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers faster and cheaper ways to break into corporate accounts. Now, researchers at ANY.RUN has uncovered a new entrant: Salty2FA, a phishing kit designed

The Time-Saving Guide for Service Providers: Automating vCISO and Compliance Services

10/09/2025 0 Comments 0 tags

Introduction Managed service providers (MSPs) and managed security service providers (MSSPs) are under increasing pressure to deliver strong cybersecurity outcomes in a landscape marked by rising threats and evolving compliance

China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations

10/09/2025 0 Comments 0 tags

The House Select Committee on China has formally issued an advisory warning of an “ongoing” series of highly targeted cyber espionage campaigns linked to the People’s Republic of China (PRC)

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws

10/09/2025 0 Comments 0 tags

SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities in SAP Netweaver that could result in code execution and the upload arbitrary files. The

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

10/09/2025 0 Comments 0 tags

Adobe has warned of a critical security flaw in its Commerce and Magento Open Source platforms that, if successfully exploited, could allow attackers to take control of customer accounts. The

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

09/09/2025 0 Comments 0 tags

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly efficient attack pipeline” in recent phishing campaigns, according to new

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities

09/09/2025 0 Comments 0 tags

A new Android malware called RatOn evolved from a basic tool capable of conducting Near Field Communication (NFC) attacks to a sophisticated remote access trojan with Automated Transfer System (ATS)

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

09/09/2025 0 Comments 0 tags

⚠️ One click is all it takes. An engineer spins up an “experimental” AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

09/09/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last

From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks

09/09/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to