3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

24/10/2025 0 Comments 0 tags

A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

24/10/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft Extension Marketplace, underscoring how developers have

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

23/10/2025 0 Comments 0 tags

Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

23/10/2025 0 Comments 0 tags

AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you’re in security, that excitement often comes with a sinking feeling. Because while everyone else

ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

23/10/2025 0 Comments 0 tags

Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries.

Why Organizations Are Abandoning Static Secrets for Managed Identities

23/10/2025 0 Comments 0 tags

As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the weak link. For decades, organizations have relied on

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

23/10/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

23/10/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

23/10/2025 0 Comments 0 tags

E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento Open Source platforms, with more than 250

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

22/10/2025 0 Comments 0 tags

The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute a backdoor called Phoenix to various organizations