Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

09/10/2025 0 Comments 0 tags

SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files contain encrypted credentials and configuration

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

09/10/2025 0 Comments 0 tags

Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to breach targets once considered secure. From communication platforms to connected devices, every

SaaS Breaches Start with Tokens – What Security Teams Must Watch

09/10/2025 0 Comments 0 tags

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token hygiene to prevent attacks. Most

From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine

09/10/2025 0 Comments 0 tags

Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025 (H1 2025), the country’s State Service for

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

09/10/2025 0 Comments 0 tags

Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, and take

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

08/10/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites. “Site visitors get injected

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

08/10/2025 0 Comments 0 tags

Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

08/10/2025 0 Comments 0 tags

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an

Step Into the Password Graveyard… If You Dare (and Join the Live Session)

08/10/2025 0 Comments 0 tags

Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login.

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now

08/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution. The vulnerability, tracked as