Category: Security News & Threat Intelligence
Microsoft Suspends 3,000 Outlook and Hotmail Accounts L...
In July 2025, Microsoft suspended over 3,000 Outlook and Hotmail accounts tied to North Korea’s APT group "Jasper Sleet," who infi...
What is the APT36 BOSS Linux attack and how are weaponi...
APT36, a Pakistan-based threat actor group, is now targeting India's BOSS Linux systems with phishing attacks that deliver weaponi...
What is the SafePay ransomware and how does it use doub...
SafePay is a recent ransomware threat that emerged in late 2024 and continues to spread rapidly across industries in 2025. It uses...
What is the Next.js cache poisoning vulnerability (CVE-...
A serious security flaw (CVE-2025-49826) was discovered in Next.js versions 15.1.0 to 15.1.8, allowing attackers to poison the cac...
How are hackers using Inno Setup Installer to deliver m...
In 2025, cybercriminals are abusing the trusted Inno Setup Windows installer to deliver multi-stage malware such as RedLine Steale...
What is the HIKVISION ApplyCT Vulnerability and How Doe...
The HIKVISION ApplyCT Vulnerability (CVE-2025-34067) is a critical remote code execution flaw in the HikCentral Integrated Securit...
What are the most dangerous Active Directory misconfigu...
This blog explores six of the most dangerous Active Directory misconfigurations—Kerberoasting, AS-REP Roasting, LLMNR Poisoning, N...
What are the Apache Tomcat and Camel vulnerabilities CV...
In March 2025, three critical vulnerabilities—CVE-2025-24813, CVE-2025-27636, and CVE-2025-29891—were discovered in Apache Tomcat ...
What are the best anti-phishing tools for SOC analysts ...
In 2025, phishing remains one of the top cyber threats, making it essential for SOC (Security Operations Center) analysts to use r...
Why are hackers sending PDFs that look like Microsoft o...
Cybercriminals are now using PDF attachments in phishing emails that impersonate trusted brands like Microsoft, DocuSign, PayPal, ...
What are the hidden weaknesses in AI SOC tools and how ...
AI-powered SOC tools are widely used to detect and respond to cyber threats, but they have hidden vulnerabilities that many securi...
What are the Firefox extensions that steal cryptocurren...
In July 2025, over 40 malicious Firefox extensions were discovered targeting popular crypto wallet users such as MetaMask, Trust W...
Microsoft Edge Security Update July 2025 | Chromium 0-...
Microsoft has patched a critical 0-day Chromium vulnerability (CVE-2025-6554) actively exploited in the wild. Learn how Edge users...
Adidas Korea Data Breach 2025 | Customers' Personal In...
Adidas confirms a 2025 data breach affecting Korean customers through a third-party support vendor. Learn what was exposed, how Ad...
12-Year-Old Sudo Vulnerability CVE-2025-32462 Allows Ro...
A critical 12-year-old Sudo vulnerability (CVE-2025-32462) lets attackers escalate privileges to root on Linux and macOS systems. ...