Hackers Exploit LastPass's Post-Death Account Access Feature

Hackers Exploit LastPass's Post-Death Account Access Feature

Cybercriminals are leveraging LastPass's after-death account handover procedures to trick users into revealing their login credentials. The campaign, linked to the CryptoChameleon group, involves sending fake emails about legacy access requests that redirect victims to phishing sites.
Oct 25, 2025 Actor: CryptoChameleon Sector: Technology Region: Global
AI-Powered Ransomware: The Emerging Threat to Organizations

AI-Powered Ransomware: The Emerging Threat to Organizations

The rise of AI-powered ransomware marks a significant shift in the cybersecurity landscape, with 80% of ransomware attacks now utilizing artificial intelligence. This new category of ransomware not only encrypts files but also learns and adapts to maximize damage, posing unprecedented challenges for organizations worldwide.
Oct 25, 2025 Actor: FunkSec Sector: Government, Defense, Technology, Education Region: Global
New Text Message Based Phishing Attack from China Targeting Users Worldwide

New Text Message Based Phishing Attack from China Targeting Users Worldwide

A sophisticated text message phishing campaign, attributed to the Smishing Triad, is targeting users globally, affecting over 121 countries. The operation utilizes advanced social engineering tactics and operates through a Phishing-as-a-Service ecosystem.
Oct 25, 2025 Actor: Smishing Triad Sector: multiple sectors (banking, healthcare, law enforcement, e-commerce, government) Region: Global
North Korean Threat Actors Target European Drone Makers

North Korean Threat Actors Target European Drone Makers

Researchers have identified a new wave of cybersecurity attacks against European drone makers by the Lazarus Group, a North Korean government-affiliated threat actor. This campaign, part of 'Operation DreamJob,' uses social engineering tactics to exfiltrate proprietary information.
Oct 24, 2025 Actor: Lazarus Group Sector: Defense and Aerospace Region: Europe
Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Google's Threat Intelligence Group has uncovered a Vietnamese cybercriminal campaign that uses fake job postings to compromise digital marketing professionals. The campaign, tracked as UNC6229, employs social engineering and malware tactics to hijack corporate advertising accounts.
Oct 24, 2025 Actor: UNC6229 Sector: Digital Marketing Region: Vietnam
Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada has confirmed a data breach where customer records were leaked by threat actors. The company is notifying affected customers and has upgraded its security measures following the incident.
Oct 24, 2025
Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Cybercriminals are increasingly leveraging Clickfix social engineering tactics and AI in Business Email Compromise (BEC) scams, leading to a 500% surge in Clickfix attacks in early 2025. Mimecast's latest report reveals a shift in tactics that focus on the human element, making phishing and scams harder to detect.
Oct 24, 2025 Actor: Scattered Spider, TA2541 Sector: Education, IT, Telecommunications, Legal, Real Estate Region: Global
Mimecast Report: AI Phishing and ClickFix Attacks Explode

Mimecast Report: AI Phishing and ClickFix Attacks Explode

Mimecast's latest report reveals a staggering 500% increase in AI-driven phishing and ClickFix schemes as cybercriminals exploit trusted services to bypass email security. The report highlights that phishing now accounts for 77% of all attacks, marking a significant evolution in attacker behavior.
Oct 23, 2025 Actor: Scattered Spider Sector: Financial, Government, Education, Real Estate Region: US, UK
Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Caminho, a Brazilian Loader-as-a-Service (LaaS), uses Least Significant Bit (LSB) steganography to hide .NET payloads in images, allowing malware to bypass defenses. This threat targets businesses across South America, Africa, and Eastern Europe, utilizing spear-phishing tactics to deliver its payloads.
Oct 23, 2025 Actor: Caminho Loader Operators Sector: Various (targeting businesses) Region: South America, Africa, Eastern Europe
Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Researchers have uncovered a large-scale phishing operation known as Smishing Triad, which utilizes text messages to deceive victims. The campaign involves thousands of malicious actors and has registered approximately 195,000 domains since January 2024, primarily targeting sensitive personal information.
Oct 23, 2025 Actor: Smishing Triad Sector: Multiple sectors including finance, healthcare, and government Region: Global, with a focus on the U.S. and China
Attackers Abuse Grok to Spread Phishing Links

Attackers Abuse Grok to Spread Phishing Links

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.
Oct 23, 2025 Actor: Unknown threat actors Sector: General Region: Global
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

The Bitter APT group is leveraging an old vulnerability in WinRAR to deploy new backdoor attacks. This highlights the ongoing threat posed by advanced persistent threats (APTs) that exploit outdated software vulnerabilities.
Oct 22, 2025 Actor: Bitter APT Sector: Various Region: Global
Jewett-Cameron Company Targeted in Cyberattack Resulting in Data Theft

Jewett-Cameron Company Targeted in Cyberattack Resulting in Data Theft

Jewett-Cameron Company, an Oregon-based provider of fencing and pet solutions, experienced a cyberattack that led to the theft of sensitive information and disruption of business operations. The company reported that hackers deployed encryption software and threatened to release stolen data unless a ransom is paid.
Oct 22, 2025
Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

The latest version of Vidar Stealer, known as Vidar 2.0, employs advanced memory injection techniques to bypass browser encryption and steal login credentials. This update marks a significant evolution in its capabilities, allowing it to efficiently extract sensitive information from multiple browsers.
Oct 22, 2025 Actor: Loadbaks Sector: General Region: Global
Russian State Hackers Develop New Malware Tools

Russian State Hackers Develop New Malware Tools

Russian state-backed hacking group Coldriver has introduced three new malware strains, NOROBOT, YESROBOT, and MAYBEROBOT, following the exposure of their previous tool, LostKeys. These new tools are designed to evade detection and target high-value data.
Oct 22, 2025 Actor: Coldriver (Star Blizzard, Callisto) Sector: Government, High-Value Targets Region: Russia
ASP.NET Machine Key Exploit Lets Hackers Compromise IIS, Load Malicious Modules

ASP.NET Machine Key Exploit Lets Hackers Compromise IIS, Load Malicious Modules

A large-scale intrusion campaign, tracked as REF3927, is exploiting misconfigured Microsoft IIS servers that reuse publicly exposed ASP.NET machine keys. Attackers are deploying malicious modules and webshells to gain control over affected systems.
Oct 22, 2025 Actor: Chinese-speaking attackers Sector: Information Technology Region: Global
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Cybercriminals are evolving their email phishing tactics, utilizing legacy methods combined with advanced techniques to evade security measures. New strategies include the use of QR codes, password-protected attachments, and multi-stage verification chains to compromise victims.
Oct 22, 2025 Actor: Cybercriminals Sector: General Region: Global
GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

Researchers at Koi Security have identified a new cyber threat named GlassWorm that spreads through infected Visual Studio Code extensions. Utilizing invisible Unicode characters, this worm evades detection and employs the Solana blockchain for command-and-control operations.
Oct 22, 2025 Actor: Unknown Sector: Software Development Region: Global