AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown

01/08/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a cryptocurrency wallet drainer. The package, @kodane/patch-manager, claims to offer “advanced license validation

You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them

01/08/2025 0 Comments 0 tags

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

01/08/2025 0 Comments 0 tags

The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2)

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies

31/07/2025 0 Comments 0 tags

The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM)

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

31/07/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses. “Link wrapping is designed

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

31/07/2025 0 Comments 0 tags

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of freelance

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

31/07/2025 0 Comments 0 tags

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

31/07/2025 0 Comments 0 tags

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

31/07/2025 0 Comments 0 tags

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

31/07/2025 0 Comments 0 tags

Threat actors are actively exploiting a critical security flaw in “Alone – Charity Multipurpose Non-profit WordPress Theme” to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries a CVSS