Cybersecurity

From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware​

A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL.
“The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, completely

From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware​ Read Post »

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps​

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them.
“Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps​ Read Post »

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks​

SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service.
“The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said.
It also noted that it’s working to notify all

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks​ Read Post »

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More​

Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to breach targets once considered secure. From communication platforms to connected devices, every system that enhances convenience also expands the attack surface.
This edition of ThreatsDay Bulletin explores these converging risks and the safeguards that help

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More​ Read Post »

SaaS Breaches Start with Tokens – What Security Teams Must Watch​

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token hygiene to prevent attacks.
Most companies in 2025 rely on a whole range of software-as-a-service (SaaS) applications to run their operations. However, the security of these applications depends on small pieces of data called tokens. Tokens, like

SaaS Breaches Start with Tokens – What Security Teams Must Watch​ Read Post »

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers​

Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js’ Single Executable Application (SEA) feature as a way to distribute its payloads.
According to Fortinet FortiGuard Labs, select iterations have also employed the open-source Electron framework to deliver the malware. It’s assessed that the malware is being propagated through

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers​ Read Post »

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries​

A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts.
“Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,” the

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries​ Read Post »

From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation​

Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025.
The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially suspicious

From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation​ Read Post »

The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?​

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt.
But not all AI SOC platforms are created equal.
From prompt-dependent copilots to autonomous, multi-agent systems, the current market offers

The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?​ Read Post »

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign​

Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign.
The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology, and energy

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign​ Read Post »

Scroll to Top