U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

31/05/2025 0 Comments 0 tags

A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

30/05/2025 0 Comments 0 tags

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. “This campaign leverages deceptive

From the “Department of No” to a “Culture of Yes”: A Healthcare CISO’s Journey to Enabling Modern Care

30/05/2025 0 Comments 0 tags

Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn’t mince words: “Healthcare loves to walk backwards into

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

30/05/2025 0 Comments 0 tags

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil,

U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

30/05/2025 0 Comments 0 tags

The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based company named Funnull Technology Inc. and its administrator Liu Lizhi for providing infrastructure

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

30/05/2025 0 Comments 0 tags

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

30/05/2025 0 Comments 0 tags

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. “We detected and removed these campaigns before

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

29/05/2025 0 Comments 0 tags

Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware

New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

29/05/2025 0 Comments 0 tags

Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS (Disk Operating

DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

29/05/2025 0 Comments 0 tags

The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data