Beware of New Phishing Attack that Abuses Cloudflare and ZenDesk Pages to Steal Logins
A sophisticated phishing campaign has emerged, exploiting the trust placed in legitimate cloud hosting services.
Threat actors are leveraging Cloudflare Pages and ZenDesk platforms to...
New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
Supply chain attacks targeting the JavaScript ecosystem have evolved into sophisticated operations combining domain manipulation with social engineering.
On September 8, 2025, threat actors launched...
Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
In October 2025, threat researchers at Cyble Research and Intelligence Labs uncovered a sophisticated cyber attack leveraging weaponized military documents to distribute an advanced...
New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic
A sophisticated campaign targeting military personnel across Russia and Belarus has emerged, deploying a complex multi-stage infection chain that establishes covert remote access through...
Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
Throughout the first half of 2025, financially motivated threat actors have shifted their approach to intrusions, abandoning traditional implant-heavy methods in favor of a...
Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
The explosive growth of artificial intelligence has created an unexpected security threat as cybercriminals exploit ChatGPT's popularity through counterfeit mobile applications.
Recent security research uncovered...
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
In mid-2025, researchers discovered a sophisticated campaign orchestrated by the Chinese state-sponsored threat group BRONZE BUTLER (also known as Tick) targeting organizations relying on...
Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads
A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free and open-source Command and Control framework originally designed for...
Hackers Weaponizing Windows LNK 0-Day RCE Vulnerability to Attack European Diplomats
Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target European diplomatic entities across Hungary, Belgium, Serbia, Italy, and...
Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access
Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication by introducing advanced malware toolsets designed to establish persistent...












.webp?w=100&resize=100,70&ssl=1)


