Category: Data Breaches

Your blog category

  • 5 Reasons Why Attackers Are Phishing Over LinkedIn

    5 Reasons Why Attackers Are Phishing Over LinkedIn

    Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps.
    LinkedIn in particular has become a hotbed for phishing attacks, and for good reason. Attackers are running sophisticated spear-phishing attacks against company executives, with recent campaigns seen targeting

  • Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

    Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

    The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a remote access trojan called Gh0st RAT.
    The campaign, which is primarily aimed at Chinese-speaking users, employs trojanized NSIS installers masquerading as legitimate like Google Chrome and Microsoft Teams, according to Elastic Security Labs.
    “The

  • Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

    Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

    Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling below 20% of total vulnerabilities for the first time.
    “We adopted Rust for its security and are seeing a 1000x reduction in memory safety vulnerability density compared to Android’s C and C++ code. But the biggest surprise was

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

    RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

    The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution.
    The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request to the “/bin/get/Main/

  • Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies

    Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies

    The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions.
    The five individuals are listed below –

    Audricus Phagnasay, 24
    Jason Salazar, 30
    Alexander Paul Travis, 34
    Oleksandr Didenko, 28, and
    Erick

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

    North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

    The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads.
    “The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure,” NVISO researchers Bart Parys, Stef

  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

    Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

    Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and SGLang.
    “These vulnerabilities all traced back to the same root cause: the overlooked unsafe use of ZeroMQ (ZMQ) and Python’s pickle deserialization,”

  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

    Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

    The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new espionage-focused campaign.
    The activity, detected in early September 2025 and assessed to be ongoing, has been codenamed SpearSpecter by the Israel National Digital Agency (INDA).
    “The

  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

    Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

    Key Takeaways:

    85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.
    1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure.
    14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns.
    LockBit’s reappearance with

  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

    Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

    State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a “highly sophisticated espionage campaign” in mid-September 2025.
    “The attackers used AI’s ‘agentic’ capabilities to an unprecedented degree – using AI not just as an advisor, but to execute the cyber attacks themselves,” the AI upstart