Russian APT28 Deploys “NotDoor” Backdoor Through Microsoft Outlook Hack Read 3 weeks ago APT28 hackers deploy NotDoor backdoor via Microsoft Outlook macros, using OneDrive sideloading to steal data and evade detection. Waqas
Model Namespace Reuse Flaw Hijacks AI Models on Google and Microsoft Platforms Hack Read 3 weeks ago A new security vulnerability called ‘Model Namespace Reuse’ allows attackers to hijack AI models on Google, Microsoft, and… Deeba Ahmed
New Malware Uses Windows Character Map for Cryptomining Hack Read 3 weeks ago Darktrace reports new malware hijacking Windows Character Map for cryptomining, exposing risks of hidden attacks in everyday software… Deeba Ahmed
Sendmarc appoints Rob Bowker as North American Region Lead Hack Read 3 weeks ago Wilmington, United States, 4th September 2025, CyberNewsWire CyberNewswire
Scattered Lapsus$ Hunters Demand Google Fire Security Experts or Face Data Leak Hack Read 3 weeks ago Note: The names of both employees have been removed for privacy reasons, following a request from Google. We are now referring to them as Worker 1 and Worker 2. Waqas
CISA Adds TP-Link Wi-Fi and WhatsApp Spyware Flaws to KEV List Hack Read 3 weeks ago CISA updates its KEV List with TP-Link Wi-Fi extender and WhatsApp spyware flaws, urging users and agencies to… Deeba Ahmed
Jaguar Land Rover Cyberattack Disrupts Production and Sales Operations Hack Read 3 weeks 1 day ago Jaguar Land Rover is restoring systems after a cyberattack disrupted production and sales, with a hacker group previously… Waqas
Why Users and Businesses Are Choosing to Get Paid in USDT Instead of Local Currency Hack Read 3 weeks 1 day ago Discover why USDT stablecoin payments are becoming popular worldwide. Learn the benefits, risks, and practical tips for using… Owais Sultan
Cloudflare Mitigates Largest Ever Recorded DDoS Attack at 11.5 Tbps Hack Read 3 weeks 1 day ago Cloudflare mitigated the largest DDoS attack ever recorded, an 11.5 Tbps flood that lasted 35 seconds without disrupting… Waqas
Governance-Driven Automation: How Flowable Is Redefining Digital Process Management Hack Read 3 weeks 1 day ago A newly published independent research report highlights Flowable’s rise in the digital process automation market. Built on open-source… Owais Sultan
Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files Hack Read 3 weeks 1 day ago Cybersecurity researcher Jeremiah Fowler discovered an unsecured and misconfigured server exposing 378 GB of internal Navy Federal Credit… Deeba Ahmed
Fake AnyDesk Installer Spreads MetaStealer Through ClickFix Scam Hack Read 3 weeks 1 day ago A new and clever ClickFix scam is using a fake AnyDesk installer and Windows search to bypass security,… Deeba Ahmed
Cloudflare Confirms Data Breach Linked to Salesforce and Salesloft Drift Hack Read 3 weeks 2 days ago Cloudflare confirms a Salesforce-linked data breach via Salesloft Drift, exposing customer support case data but leaving core systems… Waqas
Palo Alto Networks, Zscaler and PagerDuty Hit in Salesforce Linked Data Breaches Hack Read 3 weeks 2 days ago Hackers exploited the Salesloft Drift app to steal OAuth tokens and access Salesforce data, exposing customer details at… Deeba Ahmed
Leaked ChatGPT Chats: Users Treat AI as Therapist, Lawyer, Confidant Hack Read 3 weeks 2 days ago Leaked ChatGPT chats reveal users sharing sensitive data, resumes, and seeking advice on mental health, exposing risks of… Waqas
Silver Fox APT Exploits Signed Windows Driver to Deliver ValleyRAT Hack Read 3 weeks 2 days ago Check Point reports Silver Fox APT using a signed WatchDog driver flaw to disable Windows security and deliver… Waqas
How Live Threat Intelligence Cuts Cybersecurity Expenses Hack Read 3 weeks 3 days ago Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. Owais Sultan
Hidden Commands in Images Exploit AI Chatbots and Steal Data Hack Read 3 weeks 3 days ago Hidden commands in images can exploit AI chatbots, leading to data theft on platforms like Gemini through a… Deeba Ahmed
Generative Engine Optimisation: What It Is and Why You Need an Agency for It Hack Read 3 weeks 3 days ago As digital marketing keeps changing, staying ahead means adopting the latest strategies that enhance online visibility and user… Owais Sultan
North Korea’s ScarCruft Targets Academics With RokRAT Malware Hack Read 3 weeks 3 days ago A new report reveals North Korea-linked ScarCruft is using RokRAT malware to target academics in a phishing campaign.… Deeba Ahmed