Category: Data Breaches

Your blog category

  • SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers

    SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers

    Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to deliver a remote access trojan called SilentSync on Windows systems.
    “SilentSync is capable of remote command execution, file exfiltration, and screen capturing,” Zscaler ThreatLabz’s Manisha Ramcharan Prajapati and Satyam Singh said. “SilentSync also extracts

  • How CISOs Can Drive Effective AI Governance

    How CISOs Can Drive Effective AI Governance

    AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI governance. When it comes to any emerging technology, governance is hard – but effective governance is even harder. The first instinct for most organizations is to respond with rigid policies. Write a policy document, circulate a set of restrictions, and

  • Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

    Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

    Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been exploited in the wild.
    The zero-day vulnerability in question is CVE-2025-10585, which has been described as a type confusion issue in the V8 JavaScript and WebAssembly engine.
    Type confusion vulnerabilities can have severe consequences as they can be

  • From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience

    From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience

    Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking up to news that hackers have used a quantum computer to crack your company’s encryption overnight, exposing your most sensitive data, rendering much of it untrustworthy.
    And with your

  • Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts

    Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts

    A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures.
    “In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party (CCP), as well as the

  • Rethinking AI Data Security: A Buyer’s Guide 

    Rethinking AI Data Security: A Buyer’s Guide 

    Generative AI has gone from a curiosity to a cornerstone of enterprise productivity in just a few short years. From copilots embedded in office suites to dedicated large language model (LLM) platforms, employees now rely on these tools to code, analyze, draft, and decide. But for CISOs and security architects, the very speed of adoption has created a paradox: the more powerful the tools, the

  • Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims

    Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims

    Cybersecurity researchers have tied a fresh round of cyber attacks targeting financial services to the notorious cybercrime group known as Scattered Spider, casting doubt on their claims of going “dark.”
    Threat intelligence firm ReliaQuest said it has observed indications that the threat actor has shifted their focus to the financial sector. This is supported by an increase in lookalike domains

  • DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM

    DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM

    The U.S. Department of Justice (DoJ) on Tuesday resentenced the former administrator of BreachForums to three years in prison in connection with his role in running the cybercrime forum and possessing child sexual abuse material (CSAM).
    Conor Brian Fitzpatrick (aka Pompompurin), 22, of Peekskill, New York, pleaded guilty to one count of access device conspiracy, one count of access device

  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

    SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

    A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228 countries and territories.
    “These apps deliver their fraud payload using steganography and create hidden WebViews to navigate to threat actor-owned cashout sites, generating fraudulent ad impressions and clicks,” HUMAN’s Satori Threat Intelligence and

  • New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

    New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

    Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware.
    “The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection,” Acronis security researcher Eliad