Cyber Threat News

Stay informed about the latest cybersecurity challenges with our Cyber Threat News category. From ransomware attacks and phishing scams to advanced persistent threats (APTs), we provide up-to-date insights on the most pressing cyber risks affecting individuals and businesses.

Our expert analyses cover how these threats evolve, who they target, and what steps you can take to safeguard your data. Whether it’s breaking news on global cyber incidents or trends shaping the future of cybersecurity, you’ll find it here.

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively. The "MITRE Engenuity ATT&CK Evaluations: Enterprise" serve as an essential resource for cybersecurity decision-makers. These evaluations simulate...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
New Skimmer Malware Steals Credit Card Data From Checkout Pages

New Skimmer Malware Steals Credit Card Data From Checkout Pages

A new skimmer malware is targeting Magento-powered eCommerce websites, stealing sensitive credit card information from checkout pages.  This malware dynamically creates a false credit card form or directly extracts payment fields, activating only on checkout...
Windows 11 Integer Overflow Vulnerability

New Windows 11 Integer Overflow Vulnerability Lets Attackers Elevate Privileges

A critical security flaw in Windows 11 has been discovered, allowing attackers to gain elevated system privileges through an integer overflow vulnerability. The exploit, which affects the ksthunk.sys driver was successfully demonstrated at the recent...
T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers

T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers

T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network. This announcement follows reports from earlier this month about Salt Typhoon's successful breaches of wiretap systems managed...
New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices

New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices

A newly discovered malware, dubbed GodLoader, is raising alarms in the cybersecurity community for its ability to stealthily infect devices across multiple operating systems, including Windows, macOS, Linux, Android, and iOS. Unveiled by Check Point...
Elpaco Ransomware Via RDP

New Elpaco Ransomware Actors Connect Via RDP To Deploy Ransomware

Elpaco ransomware, a Mimic variation, has been identified where attackers were able to connect via RDP to the victim's server following a successful brute force attack and subsequently execute the ransomware. The variant abuses the...
Teaching AI to Hack

Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows

In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments. The study, conducted by Haitham S. Al-Sinani from the...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...