Cybersecurity researchers have identified a sophisticated new remote access trojan called DuplexSpy RAT that enables attackers to establish comprehensive surveillance and control over Windows systems. This multifunctional malware represents a growing trend in modular, GUI-driven threats that significantly lower the…
Tag: Cyber Security News
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner
A sophisticated new malware campaign has emerged targeting Windows systems through an elaborate social engineering scheme involving backdoored gaming software. The Blitz malware, first identified in late 2024 and evolving through 2025, represents a concerning trend of cybercriminals exploiting gaming…
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight
A sophisticated supply chain attack has compromised 16 popular React Native packages with over one million combined weekly downloads, marking a significant escalation in ongoing NPM ecosystem threats. The attack, which began on June 6th, 2025, systematically backdoored packages within…
How to Use SIEM Tools for Real-Time Threat Monitoring
Real-time threat monitoring through Security Information and Event Management (SIEM) tools has become crucial for organizations seeking to defend against sophisticated cyberattacks. Real-time threat detection refers to the ability to identify and respond to cyber threats as they occur, minimizing…
Malicious npm Packages as Utilities Let Attackers Destroy Production Systems
Security researchers have uncovered a disturbing new threat in the npm ecosystem where malicious packages masquerade as legitimate utilities while harboring destructive backdoors capable of wiping entire production environments. These packages represent a significant escalation from traditional credential theft or…
Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025
If you’re shopping around for cybersecurity solutions in 2025, you’re probably feeling a little overwhelmed and not sure where to turn. Not only are there more attacks than ever before (and more sophisticated), but there are a wide range of…
Critical Wazuh Server RCE Vulnerability Exploited to Deploy Mirai Variants
Security researchers at Akamai have discovered active exploitation of a critical remote code execution vulnerability in Wazuh servers, marking the first reported in-the-wild attacks against the open-source security platform since the flaw’s disclosure earlier this year. The vulnerability, tracked as…
United Natural Foods Suffers Cyberattack – System Operations Halted
Major grocery distributor takes systems offline following security breach, disrupting supply chain operations. United Natural Foods, Inc. (UNFI), one of North America’s largest wholesale food distributors, is grappling with a significant cyberattack that has forced the company to halt critical…
OpenAI Banned ChatGPT Accounts Used by Russian, Iranian, and Chinese Hackers
OpenAI has disrupted a sophisticated network of state-sponsored threat actors from Russia, Iran, and China who were exploiting ChatGPT to conduct cyber operations, influence campaigns, and malware development. The artificial intelligence company’s latest threat intelligence report, released in June 2025,…
Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram
A sophisticated tracking method employed by Meta (Facebook) and Yandex that potentially affected billions of Android users through covert web-to-app communications via localhost sockets. The technique allowed native Android apps, including Facebook and Instagram, to silently receive browser metadata, cookies,…