LATEST

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

A multi-million dollar ATM jackpotting scheme has resulted in the indictment of 54 individuals. Ploutus malware was used in the massive conspiracy to breach automated teller machines (ATMs) a

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

The extensions are marketed as a "multi-location network speed test plug-in" for foreign trade staff and developers. Believing they are buying a genuine VPN service, users pay subscriptions b

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Users are being urged by Trust Wallet to update to the most recent version of its Google Chrome extension. The multi-chain, non-custodial cryptocurrency wallet service stated that version

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

For many years, traditional security frameworks have been beneficial to organizations. However, AI systems function very differently from the applications that these frameworks were intended

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

A criminal network running call centers in Dnipro, Ivano-Frankivsk, and Kyiv was targeted by authorities in the Czech Republic, Latvia, Lithuania, and Ukraine. Over 400 victims in Europe were

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

Attackers are blending in, taking control of reliable apps, common tools, and even AI assistants. Nezha is an open-source monitoring tool that malicious actors are using to access compromised

The Case for Dynamic AI-SaaS Security as Copilots Scale

The Case for Dynamic AI-SaaS Security as Copilots Scale

Artificial intelligence copilots and agents have subtly infiltrated the SaaS apps that companies use on a daily basis during the past year. AI assistants or agent-like features are now integr

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

A security vulnerability in Secure Mobile Access (SMA) 100 series appliances has been fixed by SonicWall. Tracked as CVE-2025-40602, the vulnerability relates to a local privilege escalation

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

A number of businesses have been charged by the SEC for allegedly participating in a complex cryptocurrency scam. According to the SEC, the scam was a multi-step fraud that used social media

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A phishing campaign has been linked to a group thought to be affiliated with Russia. Proofpoint is monitoring the activity, which has been going on since September 2025, under the name UNK_Ac

Top 5 this week

Page 198 of 202