Beware of Fake Voicemail Notifications: A New Phishing Scam

Beware of Fake Voicemail Notifications: A New Phishing Scam

Scammers are now using fake voicemail notifications to trick users into revealing their credentials. These phishing emails often appear legitimate, leading victims to fake login pages or triggering malware downloads.
Oct 25, 2025 Actor: Unknown Sector: General Region: Global
New Text Message Based Phishing Attack from China Targeting Users Worldwide

New Text Message Based Phishing Attack from China Targeting Users Worldwide

A sophisticated text message phishing campaign, attributed to the Smishing Triad, is targeting users globally, affecting over 121 countries. The operation utilizes advanced social engineering tactics and operates through a Phishing-as-a-Service ecosystem.
Oct 25, 2025 Actor: Smishing Triad Sector: multiple sectors (banking, healthcare, law enforcement, e-commerce, government) Region: Global
Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Salt Typhoon, a China-linked APT group, is leveraging zero-day exploits and DLL sideloading techniques to conduct sophisticated cyber espionage campaigns against critical infrastructure worldwide. Recent activities include targeting telecommunications and energy sectors, demonstrating advanced capabilities to compromise lawful intercept systems.
Oct 24, 2025 Actor: Salt Typhoon Sector: Telecommunications, Energy Region: Global
Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Researchers have uncovered a large-scale phishing operation known as Smishing Triad, which utilizes text messages to deceive victims. The campaign involves thousands of malicious actors and has registered approximately 195,000 domains since January 2024, primarily targeting sensitive personal information.
Oct 23, 2025 Actor: Smishing Triad Sector: Multiple sectors including finance, healthcare, and government Region: Global, with a focus on the U.S. and China
Attackers Abuse Grok to Spread Phishing Links

Attackers Abuse Grok to Spread Phishing Links

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.
Oct 23, 2025 Actor: Unknown threat actors Sector: General Region: Global
Navigating the Future of AI Governance: Insights from California's SB 53

Navigating the Future of AI Governance: Insights from California's SB 53

As AI becomes integral to various sectors, the need for robust governance frameworks is critical. California's SB 53 is a pioneering step towards regulating AI, but organizations must proactively implement oversight and accountability measures to manage risks effectively.
Oct 23, 2025
Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

The latest version of Vidar Stealer, known as Vidar 2.0, employs advanced memory injection techniques to bypass browser encryption and steal login credentials. This update marks a significant evolution in its capabilities, allowing it to efficiently extract sensitive information from multiple browsers.
Oct 22, 2025 Actor: Loadbaks Sector: General Region: Global
Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

A new strain of Rust-based malware, dubbed ChaosBot, exploits the Discord platform for its Command and Control operations, embedding malicious activity behind legitimate traffic. Its advanced evasion capabilities pose significant challenges for defenders.
Oct 22, 2025 Actor: Unknown Sector: General Region: Global
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Cybercriminals are evolving their email phishing tactics, utilizing legacy methods combined with advanced techniques to evade security measures. New strategies include the use of QR codes, password-protected attachments, and multi-stage verification chains to compromise victims.
Oct 22, 2025 Actor: Cybercriminals Sector: General Region: Global