Latest Articles

Spear Phishing Malware

Spear Phishing Attack Uses DarkCloud Malware to Capture Keystrokes and FTP Credentials

On September 25, 2025, eSentire’s Threat Response Unit (TRU) uncovered a sophisticated spear-phishing operation targeting a prominent manufacturing client’s Zendesk support email. The attackers...
TamperedChef malware

TamperedChef Malware Targets Productivity Tools to Exfiltrate Sensitive Information

Field Effect’s Managed Detection and Response team identified two seemingly legitimate utilities, ImageLooker.exe and Calendaromatic.exe, on September 22, 2025. Both binaries were digitally signed...
Acreed Infostealer

Cybercriminals Widely Using Acreed Infostealer with C2 through Steam Platform

Researchers have uncovered 18 distinct samples of Acreed, an advanced infostealer rapidly gaining favor among cybercriminal networks. Acreed’s architecture is notable for its innovative...

Jaguar Land Rover Details Operational Restart Following Cyber Breach

Jaguar Land Rover (JLR) has announced the controlled, phased resumption of its manufacturing operations following a significant cybersecurity incident that disrupted production earlier this...

0-Click WhatsApp Vulnerability Exploited via Malicious DNG Image

A newly disclosed zero-click remote code execution (RCE) vulnerability in WhatsApp is being actively exploited against Apple’s iOS, macOS, and iPadOS platforms. The flaw,...

Forensic-timeliner Simplifies Windows Artifact Analysis for DFIR Professionals

In the fast-paced world of digital forensics and incident response (DFIR), building a comprehensive timeline of Windows artifacts can be a time-consuming bottleneck. Forensic-Timeliner,...
Akira Ransomware

Threat Actors Target SonicWall Firewalls to Deploy Akira Ransomware with Malicious Logins

A sophisticated ransomware campaign has been compromising SonicWall SSL VPN appliances since July 2025, delivering Akira ransomware and completing a full network compromise within...

Formbricks Signature Verification Flaw Enables Unauthorized Password Resets

In a critical security lapse, the popular open-source analytics platform Formbricks has been found vulnerable to unauthorized password resets. The flaw lies in its...
Oyster Malware

Hackers Using Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

On September 25, 2025, Conscia’s Managed Detection and Response team identified a sophisticated malvertising campaign that attempted to compromise enterprise endpoints by distributing a...
Olymp Loader malware

New Olymp Loader Promises Defender Bypass via Malware as a Service and Automatic Certificate...

Olymp Loader, a Malware-as-a-Service (MaaS) offering from the threat actor collective “OLYMPO,” has quickly become a favored tool among low- and mid-tier cybercriminals since...

Cyber Security Headlines

Cyber Attacks

Attackers Exploit BMC Firmware Bugs to Circumvent Signature Verification

Supermicro’s January 2025 advisory addressed three vulnerabilities in its Baseboard Management Controller (BMC) firmware validation logic, including CVE-2024-10237...

Jaguar Land Rover Delays Factory Reopening After Cyberattack

Tata-owned Jaguar Land Rover (JLR) has announced an additional postponement of its UK production restart after a sophisticated...

Data Breach

Jaguar Land Rover Details Operational Restart Following Cyber Breach

Jaguar Land Rover (JLR) has announced the controlled, phased resumption of its manufacturing operations following a significant cybersecurity incident that disrupted production...

Cyber AI