LATEST

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

A criminal network running call centers in Dnipro, Ivano-Frankivsk, and Kyiv was targeted by authorities in the Czech Republic, Latvia, Lithuania, and Ukraine. Over 400 victims in Europe were

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

Attackers are blending in, taking control of reliable apps, common tools, and even AI assistants. Nezha is an open-source monitoring tool that malicious actors are using to access compromised

The Case for Dynamic AI-SaaS Security as Copilots Scale

The Case for Dynamic AI-SaaS Security as Copilots Scale

Artificial intelligence copilots and agents have subtly infiltrated the SaaS apps that companies use on a daily basis during the past year. AI assistants or agent-like features are now integr

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

A security vulnerability in Secure Mobile Access (SMA) 100 series appliances has been fixed by SonicWall. Tracked as CVE-2025-40602, the vulnerability relates to a local privilege escalation

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

A number of businesses have been charged by the SEC for allegedly participating in a complex cryptocurrency scam. According to the SEC, the scam was a multi-step fraud that used social media

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A phishing campaign has been linked to a group thought to be affiliated with Russia. Proofpoint is monitoring the activity, which has been going on since September 2025, under the name UNK_Ac

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

In order to sneak in a cryptocurrency wallet thief, a malicious NuGet package poses as the author of the.NET tracing library. "Tracer.Fody.NLog," the malicious package, was present in the rep

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

Threat actors are taking advantage of a security flaw called React2Shell. The vulnerability is spreading malware families such as ZnDoor and KSwapDoor. According to NTT Security and Palo Alto

Passwd: A walkthrough of the Google Workspace Password Manager

Passwd: A walkthrough of the Google Workspace Password Manager

Passwd was created especially for businesses using Google Workspace. Because Passwd is built on a zero-knowledge architecture, only users—not Passwd—can access data that has been decrypted. A

North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft

North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft

At least $2.02 billion of the over $3.4 billion that was pilfered between January and early December was the responsibility of the DPRK. $1.5 billion was lost in the February hack of the cryp

Top 5 this week

Page 206 of 210