Latest News
New JS#SMUGGLER Campaign Drops NetSupport RAT Through Infected Sites
Securonix Threat Research details the complex JS#SMUGGLER campaign, a three-step web attack using obfuscated JavaScript and hidden HTA files…
INE Earns G2 Winter 2026 Badges Across Global Markets
Cary, North Carolina, USA, 8th December 2025, CyberNewsWire
Space Bears Ransomware Claims Comcast Data Theft Through Quasar Breach
Space Bears ransowmare claims it obtained Comcast files through a breach at Quasar Inc, with threats to publish the data and separate leaks…
Over 70 Domains Used in Months-Long Phishing Spree Against US Universities
Infoblox Threat Intel reports a campaign that used the Evilginx phishing kit to bypass Multi-Factor Authentication (MFA) and steal credentials…
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach
Barts Health NHS confirms Cl0p ransomware breach via Oracle flaw. Invoice data exposed. Patient records and clinical systems remain unaffected.
Chinese State Hackers Use New BRICKSTORM Malware Against VMware Systems
CISA, NSA, and Canadian Cyber Centre warn that PRC state-sponsored hackers are using BRICKSTORM, a stealthy Go-based backdoor, for long-term…
One-Person Production: Wondershare Filmora V15 Empowers Solo Creators With AI
AI is transforming the video-making process of creators. Learn how WondershareFilmora V15 helps individual creators edit smarter using powerful AI.
Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing
Madison, United States, 5th December 2025, CyberNewsWire
New Variant of ClayRat Android Spyware Seize Full Device Control
The dangerous ClayRat Android spyware has evolved, gaining the ability to steal PINs, record screens, and disable security by abusing…
Criminal IP to Host Webinar: Beyond CVEs – From Visibility to Action with ASM
Torrance, California, USA, 5th December 2025, CyberNewsWire
PromptPwnd Vulnerability Exposes AI driven build systems to Data Theft
Aikido Security exposes a new AI prompt injection flaw in GitHub/GitLab pipelines, letting attackers steal secrets. Major companies affected.
LummaC2 Infects North Korean Hacker Device Linked to Bybit Heist
LummaC2 infostealer infects North Korean hacker’s device, exposing ties to $1.4B Bybit heist and revealing tools, infrastructure and OPSEC failures.