Category: Data Breaches

Your blog category

  • Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

    Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

    The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence.
    “The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems,” Arctic Wolf Labs said

  • Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

    Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

    Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration.
    The activity, dubbed Operation CargoTalon, has been assigned to a threat cluster tracked as UNG0901 (short for Unknown Group 901).
    “The campaign is aimed at targeting employees of Voronezh Aircraft Production Association (VASO), one

  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

    Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

    Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners.
    The threat activity clusters have been codenamed Soco404 and Koske by cloud security firms Wiz and Aqua, respectively.
    Soco404 “targets both Linux and Windows systems, deploying platform-specific malware,” Wiz

  • Overcoming Risks from Chinese GenAI Tool Usage

    Overcoming Risks from Chinese GenAI Tool Usage

    A recent analysis of enterprise data suggests that generative AI tools developed in China are being used extensively by employees in the US and UK, often without oversight or approval from security teams. The study, conducted by Harmonic Security, also identifies hundreds of instances in which sensitive data was uploaded to platforms hosted in China, raising concerns over compliance, data

  • Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices

    Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices

    Sophos and SonicWall have alerted users of critical security flaws in Sophos Firewall and Secure Mobile Access (SMA) 100 Series appliances that could be exploited to achieve remote code execution. 
    The two vulnerabilities impacting Sophos Firewall are listed below –

    CVE-2025-6704 (CVSS score: 9.8) – An arbitrary file writing vulnerability in the Secure PDF eXchange (SPX) feature can lead

  • Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

    Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

    Is Managing Customer Logins and Data Giving You Headaches? You’re Not Alone!
    Today, we all expect super-fast, secure, and personalized online experiences. But let’s be honest, we’re also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud,

  • Pentests once a year? Nope. It’s time to build an offensive SOC

    Pentests once a year? Nope. It’s time to build an offensive SOC

    You wouldn’t run your blue team once a year, so why accept this substandard schedule for your offensive side?
    Your cybersecurity teams are under intense pressure to be proactive and to find your network’s weaknesses before adversaries do. But in many organizations, offensive security is still treated as a one-time event: an annual pentest, a quarterly red team engagement, maybe an audit sprint

  • China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community

    China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community

    The Tibetan community has been targeted by a China-nexus cyber espionage group as part of two campaigns conducted last month ahead of the Dalai Lama’s 90th birthday on July 6, 2025.
    The multi-stage attacks have been codenamed Operation GhostChat and Operation PhantomPrayers by Zscaler ThreatLabz.
    “The attackers compromised a legitimate website, redirecting users via a malicious link and

  • Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems

    Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems

    Microsoft has revealed that one of the threat actors behind the active exploitation of SharePoint flaws is deploying Warlock ransomware on targeted systems.
    The tech giant, in an update shared Wednesday, said the findings are based on an “expanded analysis and threat intelligence from our continued monitoring of exploitation activity by Storm-2603.”
    The threat actor attributed to the financially

  • New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

    New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

    The Windows banking trojan known as Coyote has become the first known malware strain to exploit the Windows accessibility framework called UI Automation (UIA) to harvest sensitive information.
    “The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes’ web addresses and cryptocurrency exchanges,” Akamai security researcher Tomer