Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

19/12/2025 0 Comments 0 tags

Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

19/12/2025 0 Comments 0 tags

Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

18/12/2025 0 Comments 0 tags

A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting governmental entities in Southeast Asia and Japan. The end goal of these

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

18/12/2025 0 Comments 0 tags

Hewlett Packard Enterprise (HPE) has resolved a maximum-severity security flaw in OneView Software that, if successfully exploited, could result in remote code execution. The critical vulnerability, assigned the CVE identifier

North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft

18/12/2025 0 Comments 0 tags

Threat actors with ties to the Democratic People’s Republic of Korea (DPRK or North Korea) have been instrumental in driving a surge in global cryptocurrency theft in 2025, accounting for

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

18/12/2025 0 Comments 0 tags

This week’s ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints

The Case for Dynamic AI-SaaS Security as Copilots Scale

18/12/2025 0 Comments 0 tags

Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

18/12/2025 0 Comments 0 tags

The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

18/12/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

18/12/2025 0 Comments 0 tags

Cisco has alerted users of a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 in attacks