Beware of Fake Voicemail Notifications: A New Phishing Scam

Beware of Fake Voicemail Notifications: A New Phishing Scam

Scammers are now using fake voicemail notifications to trick users into revealing their credentials. These phishing emails often appear legitimate, leading victims to fake login pages or triggering malware downloads.
Oct 25, 2025 Actor: Unknown Sector: General Region: Global
Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada has confirmed a data breach where customer records were leaked by threat actors. The company is notifying affected customers and has upgraded its security measures following the incident.
Oct 24, 2025
Attackers Abuse Grok to Spread Phishing Links

Attackers Abuse Grok to Spread Phishing Links

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.
Oct 23, 2025 Actor: Unknown threat actors Sector: General Region: Global
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

The Bitter APT group is leveraging an old vulnerability in WinRAR to deploy new backdoor attacks. This highlights the ongoing threat posed by advanced persistent threats (APTs) that exploit outdated software vulnerabilities.
Oct 22, 2025 Actor: Bitter APT Sector: Various Region: Global
Pwn2Own Day 2: Hackers exploit 56 zero-days for $790,000

Pwn2Own Day 2: Hackers exploit 56 zero-days for $790,000

During the second day of the Pwn2Own Ireland 2025 hacking competition, researchers exploited 56 unique zero-day vulnerabilities, earning $792,750 in cash. Notable exploits included a chain of five security flaws in the Samsung Galaxy S25 and multiple vulnerabilities in various NAS devices and printers.
Oct 22, 2025
Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

A new strain of Rust-based malware, dubbed ChaosBot, exploits the Discord platform for its Command and Control operations, embedding malicious activity behind legitimate traffic. Its advanced evasion capabilities pose significant challenges for defenders.
Oct 22, 2025 Actor: Unknown Sector: General Region: Global
Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Cybercriminals are exploiting Microsoft 365's Direct Send feature to bypass security filters and conduct phishing campaigns. This legitimate feature, designed for enterprise convenience, has become a vector for business email compromise attacks, prompting security researchers to raise alarms.
Oct 22, 2025 Actor: Cybercriminals Sector: Corporate Region: Global
Astaroth Banking Malware Abuses GitHub for Resilient Configurations

Astaroth Banking Malware Abuses GitHub for Resilient Configurations

The Astaroth banking trojan has resurfaced, utilizing GitHub as a platform for malware configuration updates. This sophisticated malware employs targeted phishing tactics to steal banking and cryptocurrency credentials while evading detection through advanced techniques.
Oct 14, 2025 Actor: Astaroth malware group Sector: Banking and Cryptocurrency Region: South America
Clop Ransomware Group Claims Hack of Harvard University

Clop Ransomware Group Claims Hack of Harvard University

The Clop Ransomware group has announced a breach of Harvard University, adding it to their Tor data leak site. They claim to have stolen sensitive data and will leak it soon, raising concerns about the potential impact on the prestigious institution.
Oct 13, 2025