Hackers Exploit LastPass's Post-Death Account Access Feature

Hackers Exploit LastPass's Post-Death Account Access Feature

Cybercriminals are leveraging LastPass's after-death account handover procedures to trick users into revealing their login credentials. The campaign, linked to the CryptoChameleon group, involves sending fake emails about legacy access requests that redirect victims to phishing sites.
Oct 25, 2025 Actor: CryptoChameleon Sector: Technology Region: Global
Beware of Fake Voicemail Notifications: A New Phishing Scam

Beware of Fake Voicemail Notifications: A New Phishing Scam

Scammers are now using fake voicemail notifications to trick users into revealing their credentials. These phishing emails often appear legitimate, leading victims to fake login pages or triggering malware downloads.
Oct 25, 2025 Actor: Unknown Sector: General Region: Global
AI-Powered Ransomware: The Emerging Threat to Organizations

AI-Powered Ransomware: The Emerging Threat to Organizations

The rise of AI-powered ransomware marks a significant shift in the cybersecurity landscape, with 80% of ransomware attacks now utilizing artificial intelligence. This new category of ransomware not only encrypts files but also learns and adapts to maximize damage, posing unprecedented challenges for organizations worldwide.
Oct 25, 2025 Actor: FunkSec Sector: Government, Defense, Technology, Education Region: Global
New Text Message Based Phishing Attack from China Targeting Users Worldwide

New Text Message Based Phishing Attack from China Targeting Users Worldwide

A sophisticated text message phishing campaign, attributed to the Smishing Triad, is targeting users globally, affecting over 121 countries. The operation utilizes advanced social engineering tactics and operates through a Phishing-as-a-Service ecosystem.
Oct 25, 2025 Actor: Smishing Triad Sector: multiple sectors (banking, healthcare, law enforcement, e-commerce, government) Region: Global
Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Salt Typhoon, a China-linked APT group, is leveraging zero-day exploits and DLL sideloading techniques to conduct sophisticated cyber espionage campaigns against critical infrastructure worldwide. Recent activities include targeting telecommunications and energy sectors, demonstrating advanced capabilities to compromise lawful intercept systems.
Oct 24, 2025 Actor: Salt Typhoon Sector: Telecommunications, Energy Region: Global
Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Cybercriminals are increasingly leveraging Clickfix social engineering tactics and AI in Business Email Compromise (BEC) scams, leading to a 500% surge in Clickfix attacks in early 2025. Mimecast's latest report reveals a shift in tactics that focus on the human element, making phishing and scams harder to detect.
Oct 24, 2025 Actor: Scattered Spider, TA2541 Sector: Education, IT, Telecommunications, Legal, Real Estate Region: Global
GlassWorm Malware Targets Developers Through OpenVSX Marketplace

GlassWorm Malware Targets Developers Through OpenVSX Marketplace

GlassWorm malware is exploiting the OpenVSX marketplace to target developers, highlighting the risks associated with third-party software repositories. Developers are urged to exercise caution when downloading extensions.
Oct 23, 2025 Actor: Unknown Sector: Software Development Region: Global
Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Researchers have uncovered a large-scale phishing operation known as Smishing Triad, which utilizes text messages to deceive victims. The campaign involves thousands of malicious actors and has registered approximately 195,000 domains since January 2024, primarily targeting sensitive personal information.
Oct 23, 2025 Actor: Smishing Triad Sector: Multiple sectors including finance, healthcare, and government Region: Global, with a focus on the U.S. and China
Attackers Abuse Grok to Spread Phishing Links

Attackers Abuse Grok to Spread Phishing Links

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.
Oct 23, 2025 Actor: Unknown threat actors Sector: General Region: Global
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks

The Bitter APT group is leveraging an old vulnerability in WinRAR to deploy new backdoor attacks. This highlights the ongoing threat posed by advanced persistent threats (APTs) that exploit outdated software vulnerabilities.
Oct 22, 2025 Actor: Bitter APT Sector: Various Region: Global
Phishing Campaign Impersonates Major Brands to Steal Facebook Credentials

Phishing Campaign Impersonates Major Brands to Steal Facebook Credentials

A phishing campaign is impersonating well-known brands like KFC, Red Bull, and Ferrari to compromise Facebook login details. Malicious emails lead targets to a fake job posting site where they are prompted to enter their credentials.
Oct 22, 2025 Actor: Unknown threat actors Sector: Various (targeting multiple brands) Region: Global
Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

The latest version of Vidar Stealer, known as Vidar 2.0, employs advanced memory injection techniques to bypass browser encryption and steal login credentials. This update marks a significant evolution in its capabilities, allowing it to efficiently extract sensitive information from multiple browsers.
Oct 22, 2025 Actor: Loadbaks Sector: General Region: Global
Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

A new strain of Rust-based malware, dubbed ChaosBot, exploits the Discord platform for its Command and Control operations, embedding malicious activity behind legitimate traffic. Its advanced evasion capabilities pose significant challenges for defenders.
Oct 22, 2025 Actor: Unknown Sector: General Region: Global
ASP.NET Machine Key Exploit Lets Hackers Compromise IIS, Load Malicious Modules

ASP.NET Machine Key Exploit Lets Hackers Compromise IIS, Load Malicious Modules

A large-scale intrusion campaign, tracked as REF3927, is exploiting misconfigured Microsoft IIS servers that reuse publicly exposed ASP.NET machine keys. Attackers are deploying malicious modules and webshells to gain control over affected systems.
Oct 22, 2025 Actor: Chinese-speaking attackers Sector: Information Technology Region: Global
Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Cybercriminals are exploiting Microsoft 365's Direct Send feature to bypass security filters and conduct phishing campaigns. This legitimate feature, designed for enterprise convenience, has become a vector for business email compromise attacks, prompting security researchers to raise alarms.
Oct 22, 2025 Actor: Cybercriminals Sector: Corporate Region: Global
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Cybercriminals are evolving their email phishing tactics, utilizing legacy methods combined with advanced techniques to evade security measures. New strategies include the use of QR codes, password-protected attachments, and multi-stage verification chains to compromise victims.
Oct 22, 2025 Actor: Cybercriminals Sector: General Region: Global
Attackers Target Retailers’ Gift Card Systems Using Cloud-Only Techniques

Attackers Target Retailers’ Gift Card Systems Using Cloud-Only Techniques

A newly uncovered attack campaign, dubbed Jingle Thief, is targeting global retailers' gift card systems using phishing and smishing techniques. The attackers, believed to be based in Morocco, operate entirely in cloud environments without deploying traditional malware.
Oct 22, 2025 Actor: Morocco-based attackers Sector: Retail Region: Global
GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

Researchers at Koi Security have identified a new cyber threat named GlassWorm that spreads through infected Visual Studio Code extensions. Utilizing invisible Unicode characters, this worm evades detection and employs the Solana blockchain for command-and-control operations.
Oct 22, 2025 Actor: Unknown Sector: Software Development Region: Global
Hackers Exploit Azure Apps to Create Malicious Apps Impersonating Microsoft

Hackers Exploit Azure Apps to Create Malicious Apps Impersonating Microsoft

A recent investigation revealed a critical loophole in Azure applications that allowed hackers to create malicious apps using reserved Microsoft names. This vulnerability enabled attackers to gain unauthorized access and escalate privileges within Microsoft 365 environments, posing significant risks to organizations.
Oct 22, 2025 Actor: Unknown Sector: Information Technology Region: Global