N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

31/07/2025 0 Comments 0 tags

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of freelance

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

31/07/2025 0 Comments 0 tags

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

31/07/2025 0 Comments 0 tags

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

31/07/2025 0 Comments 0 tags

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

31/07/2025 0 Comments 0 tags

Threat actors are actively exploiting a critical security flaw in “Alone – Charity Multipurpose Non-profit WordPress Theme” to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries a CVSS

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

30/07/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data from

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

30/07/2025 0 Comments 0 tags

Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free. “Because the ransomware is now considered dead, we

Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

30/07/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices. “The flaws,

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

30/07/2025 0 Comments 0 tags

Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber

Product Walkthrough: A Look Inside Pillar’s AI Security Platform

30/07/2025 0 Comments 0 tags

In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges. Pillar Security is building a platform to