AI-Powered Ransomware: The Emerging Threat to Organizations

AI-Powered Ransomware: The Emerging Threat to Organizations

The rise of AI-powered ransomware marks a significant shift in the cybersecurity landscape, with 80% of ransomware attacks now utilizing artificial intelligence. This new category of ransomware not only encrypts files but also learns and adapts to maximize damage, posing unprecedented challenges for organizations worldwide.
Oct 25, 2025 Actor: FunkSec Sector: Government, Defense, Technology, Education Region: Global
New Text Message Based Phishing Attack from China Targeting Users Worldwide

New Text Message Based Phishing Attack from China Targeting Users Worldwide

A sophisticated text message phishing campaign, attributed to the Smishing Triad, is targeting users globally, affecting over 121 countries. The operation utilizes advanced social engineering tactics and operates through a Phishing-as-a-Service ecosystem.
Oct 25, 2025 Actor: Smishing Triad Sector: multiple sectors (banking, healthcare, law enforcement, e-commerce, government) Region: Global
Critical Vulnerability CVE-2025-59287 in Windows Server Update Services

Critical Vulnerability CVE-2025-59287 in Windows Server Update Services

Microsoft has released an out-of-band security update for a critical vulnerability in Windows Server Update Services (WSUS), tracked as CVE-2025-59287. This flaw allows remote code execution by unauthenticated threat actors, and a new patch is necessary to fully mitigate the issue as the initial patch was incomplete.
Oct 24, 2025 CVE: CVE-2025-59287
SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has developed a sophisticated attack methodology utilizing ClickOnce applications to deploy StealerBot malware against diplomatic and governmental targets in South Asia. This campaign marks a significant evolution in their tactics, employing spear-phishing emails and advanced evasion techniques.
Oct 24, 2025 Actor: SideWinder Sector: Government, Diplomatic Region: South Asia
North Korean Threat Actors Target European Drone Makers

North Korean Threat Actors Target European Drone Makers

Researchers have identified a new wave of cybersecurity attacks against European drone makers by the Lazarus Group, a North Korean government-affiliated threat actor. This campaign, part of 'Operation DreamJob,' uses social engineering tactics to exfiltrate proprietary information.
Oct 24, 2025 Actor: Lazarus Group Sector: Defense and Aerospace Region: Europe
Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Google's Threat Intelligence Group has uncovered a Vietnamese cybercriminal campaign that uses fake job postings to compromise digital marketing professionals. The campaign, tracked as UNC6229, employs social engineering and malware tactics to hijack corporate advertising accounts.
Oct 24, 2025 Actor: UNC6229 Sector: Digital Marketing Region: Vietnam
Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada Warns Customers of Data Breach

Toys “R” Us Canada has confirmed a data breach where customer records were leaked by threat actors. The company is notifying affected customers and has upgraded its security measures following the incident.
Oct 24, 2025
Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Cybercriminals are increasingly leveraging Clickfix social engineering tactics and AI in Business Email Compromise (BEC) scams, leading to a 500% surge in Clickfix attacks in early 2025. Mimecast's latest report reveals a shift in tactics that focus on the human element, making phishing and scams harder to detect.
Oct 24, 2025 Actor: Scattered Spider, TA2541 Sector: Education, IT, Telecommunications, Legal, Real Estate Region: Global
Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Caminho, a Brazilian Loader-as-a-Service (LaaS), uses Least Significant Bit (LSB) steganography to hide .NET payloads in images, allowing malware to bypass defenses. This threat targets businesses across South America, Africa, and Eastern Europe, utilizing spear-phishing tactics to deliver its payloads.
Oct 23, 2025 Actor: Caminho Loader Operators Sector: Various (targeting businesses) Region: South America, Africa, Eastern Europe
High-Severity Path Traversal Vulnerability in Jira Software

High-Severity Path Traversal Vulnerability in Jira Software

Atlassian has disclosed a critical path traversal vulnerability in Jira Software Data Center and Server, allowing authenticated attackers to write files to any path accessible by the JVM. The flaw, tracked as CVE-2025-22167, affects versions from 9.12.0 through 11.0.1 and poses significant risks if unpatched.
Oct 23, 2025 CVE: CVE-2025-22167
GlassWorm Malware Targets Developers Through OpenVSX Marketplace

GlassWorm Malware Targets Developers Through OpenVSX Marketplace

GlassWorm malware is exploiting the OpenVSX marketplace to target developers, highlighting the risks associated with third-party software repositories. Developers are urged to exercise caution when downloading extensions.
Oct 23, 2025 Actor: Unknown Sector: Software Development Region: Global
Cybersecurity Experts Warn of Vulnerabilities in OpenAI's ChatGPT Atlas

Cybersecurity Experts Warn of Vulnerabilities in OpenAI's ChatGPT Atlas

Cybersecurity experts have raised concerns about OpenAI's new browser, ChatGPT Atlas, which may be susceptible to attacks that could compromise user data. The browser's features, including 'browser memories' and 'agent mode,' could potentially be exploited through prompt injection attacks, leading to unauthorized access to sensitive information.
Oct 23, 2025
Attackers Abuse Grok to Spread Phishing Links

Attackers Abuse Grok to Spread Phishing Links

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.
Oct 23, 2025 Actor: Unknown threat actors Sector: General Region: Global
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

The Bitter APT group is leveraging an old vulnerability in WinRAR to deploy new backdoor attacks. This highlights the ongoing threat posed by advanced persistent threats (APTs) that exploit outdated software vulnerabilities.
Oct 22, 2025 Actor: Bitter APT Sector: Various Region: Global