131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign

Oct 20, 2025Ravie LakshmananBrowser Security / Malware Cybersecurity researchers have uncovered a coordinated campaign that leveraged…

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Oct 20, 2025Ravie LakshmananThreat Intelligence / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts…

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

It’s easy to think your defenses are solid — until you realize attackers have been inside…

‘A Call to Arms’ as UK Faces 50% Surge in Major Cyberattacks

Image: Adobe Stock Cyberattacks are on the rise in the UK, according to the National Cyber…

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems

Oct 20, 2025Ravie LakshmananCyber Espionage / National Security China on Sunday accused the U.S. National Security…

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

Oct 19, 2025Ravie LakshmananSIM Swapping / Cryptocurrency Europol on Friday announced the disruption of a sophisticated…

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

Oct 18, 2025Ravie LakshmananThreat Intelligence / Cybercrime Cybersecurity researchers have shed light on a new campaign…

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their…

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some…