• Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

    Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

    SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said. It also noted that it’s…

    Read More

  • SaaS Breaches Start with Tokens – What Security Teams Must Watch

    SaaS Breaches Start with Tokens – What Security Teams Must Watch

    Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token hygiene to prevent attacks. Most companies in 2025 rely on a whole range of software-as-a-service (SaaS) applications to run their operations. However, the security of these applications depends on small…

    Read More

  • From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine

    From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine

    Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025 (H1 2025), the country’s State Service for Special Communications and Information Protection (SSSCIP) said. “Hackers now employ it not only to generate phishing messages, but some of the malware samples we have…

    Read More

  • Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

    Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

    Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, and take control of susceptible sites. The authentication bypass vulnerability, tracked as CVE-2025-5947 (CVSS score: 9.8), affects the Service Finder Bookings, a WordPress plugin bundled with the

    Read More

  • Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

    Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

    Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites. “Site visitors get injected content that was drive-by malware like fake Cloudflare verification,” Sucuri researcher Puja Srivastava said in an analysis published last week. The website security company

    Read More

  • Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

    Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

    Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT to targets. The activity, observed by cybersecurity company Huntress in August 2025, is characterized by the use of an unusual technique called log poisoning (aka…

    Read More

  • Step Into the Password Graveyard… If You Dare (and Join the Live Session)

    Step Into the Password Graveyard… If You Dare (and Join the Live Session)

    Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login. For IT teams, that means endless resets, compliance struggles, and sleepless nights worrying about the next credential leak. This Halloween, The Hacker News and Specops…

    Read More

  • No Time to Waste: Embedding AI to Cut Noise and Reduce Risk

    No Time to Waste: Embedding AI to Cut Noise and Reduce Risk

    Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. Cybercriminals are using AI-powered tools to accelerate and automate attacks at a scale defenders have never faced before. Security teams are overwhelmed by an explosion of vulnerability data, tool outputs, and alerts, all while operating with finite human resources. The irony is that while…

    Read More

  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

    OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

    OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said to have used the chatbot to help develop and refine a remote access trojan (RAT), a credential stealer with an aim to evade detection. The…

    Read More

  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

    BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

    A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers and digital marketing professionals to deliver a previously undocumented malware called Vampire Bot. “The attackers pose as recruiters, distributing malicious files disguised as job descriptions and corporate documents,” Aryaka Threat Research Labs

    Read More