Shadow AI Discovery: A Critical Part of Enterprise AI Governance

02/09/2025 0 Comments 0 tags

The Harsh Truths of AI Adoption MITs State of AI in Business report revealed that while 40% of organizations have purchased enterprise LLM subscriptions, over 90% of employees are actively

Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices

02/09/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a Ukrainian IP network for engaging in massive brute-force and password spraying campaigns targeting SSL VPN and RDP devices between June and July 2025. The activity

Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware

02/09/2025 0 Comments 0 tags

The threat actor known as Silver Fox has been attributed to abuse of a previously unknown vulnerable driver associated with WatchDog Anti-malware as part of a Bring Your Own Vulnerable

Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets

02/09/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop apps for cryptocurrency wallets like Atomic and Exodus on Windows systems.

Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

01/09/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used to deliver banking trojans, to also distribute simpler malware

⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More

01/09/2025 0 Comments 0 tags

Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update, one misused account, or one hidden tool in

When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider

01/09/2025 0 Comments 0 tags

As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web

ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

01/09/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka APT37) to deliver a malware known as RokRAT. The activity has been

Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling

30/08/2025 0 Comments 0 tags

Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of legitimate

WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices

30/08/2025 0 Comments 0 tags

WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently