Home Cyber Threat News

Cyber Threat News

Stay informed about the latest cybersecurity challenges with our Cyber Threat News category. From ransomware attacks and phishing scams to advanced persistent threats (APTs), we provide up-to-date insights on the most pressing cyber risks affecting individuals and businesses.

Our expert analyses cover how these threats evolve, who they target, and what steps you can take to safeguard your data. Whether it’s breaking news on global cyber incidents or trends shaping the future of cybersecurity, you’ll find it here.

Cyber Threats of 2024

Top Sophisticated Cyber Security Threats of 2024

As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape. ANY.RUN, a leading...
CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks

CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks

CoinLurker is a sophisticated data-stealing malware that has revolutionized fake update campaigns. Written in the Go programming language, CoinLurker incorporates advanced obfuscation and anti-analysis...
WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to...
Deloitte Hacked

Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data

Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services...
Researchers Uncover Malicious Use Of Cobalt Strike Servers In Cyber Attacks

Researchers Uncover Malicious Use Of Cobalt Strike Servers In Cyber Attacks

Cybersecurity researchers have identified a cluster of servers exploiting the latest version of Cobalt Strike, a legitimate penetration testing tool, for malicious purposes. The discovery...
Russian BlueAlpha APT Abuses Cloudflare Tunnels To Deliver Custom Malware

Russian BlueAlpha APT Abuses Cloudflare Tunnels To Deliver Custom Malware

The state-sponsored cyber threat group BlueAlpha has been active since at least 2014 and has recently upgraded its malware delivery system to leverage Cloudflare...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based...
Examples of Phishing Attacks

Examples of Phishing Attacks and How to Effectively Analyze Them

Analyzing phishing attacks have become challenging as these threats continue to evolve in complexity, employing more sophisticated techniques to bypass traditional defenses.  The tools used...
AWS Security Incident Response

AWS Launched New Security Incident Response Service to Boost Enterprise Security

Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently. As cyber threats become...
Hackers Can Exploit Windows Driver Use-After-Free Vulnerability (CVE-2024-38193) to Gain Systems Privileges

Hackers Can Exploit Windows Driver Use-After-Free Vulnerability (CVE-2024-38193) to Gain Systems Privileges

A critical use-after-free vulnerability called CVE-2024-38193 is found in the Windows driver afd.sys. It affects the Registered I/O (RIO) extension for Windows sockets and...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...