How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

28/05/2025 0 Comments 0 tags

Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

28/05/2025 0 Comments 0 tags

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the

Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

27/05/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT.

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

27/05/2025 0 Comments 0 tags

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is

AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale

27/05/2025 0 Comments 0 tags

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

27/05/2025 0 Comments 0 tags

Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

27/05/2025 0 Comments 0 tags

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected

Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

27/05/2025 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

27/05/2025 0 Comments 0 tags

The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload. The attack chain is a departure

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

26/05/2025 0 Comments 0 tags

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled