Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

07/11/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

06/11/2025 0 Comments 0 tags

Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

06/11/2025 0 Comments 0 tags

A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked

ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

06/11/2025 0 Comments 0 tags

Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a

From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

06/11/2025 0 Comments 0 tags

Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises,

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

06/11/2025 0 Comments 0 tags

Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

06/11/2025 0 Comments 0 tags

The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

06/11/2025 0 Comments 0 tags

SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. “The malicious activity – carried out

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

05/11/2025 0 Comments 0 tags

Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

05/11/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories