Hackers Exploit LastPass's Post-Death Account Access Feature

Hackers Exploit LastPass's Post-Death Account Access Feature

Cybercriminals are leveraging LastPass's after-death account handover procedures to trick users into revealing their login credentials. The campaign, linked to the CryptoChameleon group, involves sending fake emails about legacy access requests that redirect victims to phishing sites.
Oct 25, 2025 Actor: CryptoChameleon Sector: Technology Region: Global
Storm-2657 Targets Universities with Payroll Phishing Scams

Storm-2657 Targets Universities with Payroll Phishing Scams

A new hacking group, Storm-2657, is targeting U.S. universities with sophisticated phishing attacks aimed at hijacking payroll payments. These 'pirate payroll' attacks exploit social engineering tactics to manipulate staff into providing sensitive login information.
Oct 25, 2025 Actor: Storm-2657 Sector: Education Region: United States
ChatGPT Atlas Faces Clipboard Injection Vulnerability

ChatGPT Atlas Faces Clipboard Injection Vulnerability

OpenAI's new AI web browser, ChatGPT Atlas, has been found to be vulnerable to clipboard injection attacks. This vulnerability could allow malicious actors to manipulate the user's clipboard, potentially leading to security breaches.
Oct 24, 2025
Critical Vulnerability CVE-2025-59287 in Windows Server Update Services

Critical Vulnerability CVE-2025-59287 in Windows Server Update Services

Microsoft has released an out-of-band security update for a critical vulnerability in Windows Server Update Services (WSUS), tracked as CVE-2025-59287. This flaw allows remote code execution by unauthenticated threat actors, and a new patch is necessary to fully mitigate the issue as the initial patch was incomplete.
Oct 24, 2025 CVE: CVE-2025-59287
SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has developed a sophisticated attack methodology utilizing ClickOnce applications to deploy StealerBot malware against diplomatic and governmental targets in South Asia. This campaign marks a significant evolution in their tactics, employing spear-phishing emails and advanced evasion techniques.
Oct 24, 2025 Actor: SideWinder Sector: Government, Diplomatic Region: South Asia
North Korean Threat Actors Target European Drone Makers

North Korean Threat Actors Target European Drone Makers

Researchers have identified a new wave of cybersecurity attacks against European drone makers by the Lazarus Group, a North Korean government-affiliated threat actor. This campaign, part of 'Operation DreamJob,' uses social engineering tactics to exfiltrate proprietary information.
Oct 24, 2025 Actor: Lazarus Group Sector: Defense and Aerospace Region: Europe
Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Google's Threat Intelligence Group has uncovered a Vietnamese cybercriminal campaign that uses fake job postings to compromise digital marketing professionals. The campaign, tracked as UNC6229, employs social engineering and malware tactics to hijack corporate advertising accounts.
Oct 24, 2025 Actor: UNC6229 Sector: Digital Marketing Region: Vietnam
Teenagers Charged in TfL Cyber Attack Case

Teenagers Charged in TfL Cyber Attack Case

Two teenagers have been charged with computer hacking offenses related to a cyber attack on Transport for London (TfL) that caused significant disruption last year. The attack, attributed to the cyber-criminal group Scattered Spider, resulted in £39 million in damages.
Oct 24, 2025
Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada has confirmed a data breach where customer records were leaked by threat actors. The company is notifying affected customers and has upgraded its security measures following the incident.
Oct 24, 2025
Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Salt Typhoon, a China-linked APT group, is leveraging zero-day exploits and DLL sideloading techniques to conduct sophisticated cyber espionage campaigns against critical infrastructure worldwide. Recent activities include targeting telecommunications and energy sectors, demonstrating advanced capabilities to compromise lawful intercept systems.
Oct 24, 2025 Actor: Salt Typhoon Sector: Telecommunications, Energy Region: Global
Star Blizzard APT Adopts New Backdoor After LostKeys Malware Exposure

Star Blizzard APT Adopts New Backdoor After LostKeys Malware Exposure

The Russian state-sponsored APT known as Star Blizzard has transitioned to using a new backdoor, MaybeRobot, following the public disclosure of its LostKeys malware. This change comes as the group continues to employ sophisticated infection techniques to target civil society members in Russia.
Oct 23, 2025 Actor: Star Blizzard (APT28) Sector: Government, Civil Society Region: Russia
Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Researchers have uncovered a large-scale phishing operation known as Smishing Triad, which utilizes text messages to deceive victims. The campaign involves thousands of malicious actors and has registered approximately 195,000 domains since January 2024, primarily targeting sensitive personal information.
Oct 23, 2025 Actor: Smishing Triad Sector: Multiple sectors including finance, healthcare, and government Region: Global, with a focus on the U.S. and China
Attackers Abuse Grok to Spread Phishing Links

Attackers Abuse Grok to Spread Phishing Links

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.
Oct 23, 2025 Actor: Unknown threat actors Sector: General Region: Global
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

The Bitter APT group is leveraging an old vulnerability in WinRAR to deploy new backdoor attacks. This highlights the ongoing threat posed by advanced persistent threats (APTs) that exploit outdated software vulnerabilities.
Oct 22, 2025 Actor: Bitter APT Sector: Various Region: Global
Phishing Campaign Impersonates Major Brands to Steal Facebook Credentials

Phishing Campaign Impersonates Major Brands to Steal Facebook Credentials

A phishing campaign is impersonating well-known brands like KFC, Red Bull, and Ferrari to compromise Facebook login details. Malicious emails lead targets to a fake job posting site where they are prompted to enter their credentials.
Oct 22, 2025 Actor: Unknown threat actors Sector: Various (targeting multiple brands) Region: Global
Russian State Hackers Develop New Malware Tools

Russian State Hackers Develop New Malware Tools

Russian state-backed hacking group Coldriver has introduced three new malware strains, NOROBOT, YESROBOT, and MAYBEROBOT, following the exposure of their previous tool, LostKeys. These new tools are designed to evade detection and target high-value data.
Oct 22, 2025 Actor: Coldriver (Star Blizzard, Callisto) Sector: Government, High-Value Targets Region: Russia