Category: Data Breaches

Your blog category

  • Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

    Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

    The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware.
    According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine.
    “This hidden environment, with its lightweight

  • SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

    SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

    SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files.
    “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” the company said in a

  • Securing the Open Android Ecosystem with Samsung Knox

    Securing the Open Android Ecosystem with Samsung Knox

    Raise your hand if you’ve heard the myth, “Android isn’t secure.”
    Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical.
    However, outdated concerns can hold your business back from unlocking its full potential. The truth is, with work happening everywhere, every device connected to your

  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

    Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

    A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel.
    “UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the

  • U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud

    U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud

    The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various illicit schemes, including cybercrime and information technology (IT) worker fraud.
    “North Korean state-sponsored hackers steal and launder money to fund the regime’s nuclear weapons program,” said Under Secretary of

  • Why SOC Burnout Can Be Avoided: Practical Steps

    Why SOC Burnout Can Be Avoided: Practical Steps

    Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to be the norm. The path out isn’t through working harder, but through working smarter, together.
    Here are three practical steps every SOC can

  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

    CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
    The vulnerabilities in question are listed below –

    CVE-2025-11371 (CVSS score: 7.5) – A vulnerability in files or directories accessible to

  • Ransomware Defense Using the Wazuh Open Source Platform

    Ransomware Defense Using the Wazuh Open Source Platform

    Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging threats in the digital landscape, affecting individuals, businesses, and critical infrastructure worldwide.
    A ransomware attack typically begins when the malware infiltrates a system through various vectors such as

  • Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

    Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

    Threat actors are leveraging weaponized attachments distributed via phishing emails to deliver malware likely targeting the defense sector in Russia and Belarus.
    According to multiple reports from Cyble and Seqrite Labs, the campaign is designed to deploy a persistent backdoor on compromised hosts that uses OpenSSH in conjunction with a customized Tor hidden service that employs obfs4 for

  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the WebKit component used in its Safari web browser that, if successfully exploited, could result in a browser crash or memory corruption.
    The list of vulnerabilities is as follows –

    CVE-2025-43429 – A buffer overflow