Digital threats are evolving at an ever-increasing rate, and a new breed of cybersecurity companies is emerging into the limelight as a result. These innovative and dynamic teams are addressing a wide range of issues, including cloud-native vulnerabilities and AI-powered…
Tag: Cyber Security News
Staying Ahead Of The Curve With A Temporary Email Address
The world is changing so quickly. Just when you thought you had heard it all, something as genius as a temporary email address came out of the fold. Oh, wait, you haven’t heard of this? Well, then you’re in luck…
How AI Is Redefining Threat Detection In The Cloud Era
Every second, AWS processes 1.2 billion API calls. Each one triggers a security check. That’s not just impressive it’s the backbone of what might be the world’s largest security operation. While we’re debating whether AI will change cybersecurity, AWS has…
Strengthening Security Measures In Digital Advertising Platforms
Data breaches pose significant threats to digital advertising platforms, jeopardizing user privacy and trust. Implementing robust security measures within display ad servers is crucial to safeguard sensitive information. Transparent practices, encryption, and routine audits are vital to maintaining data integrity…
New Phishing Attack Mimics Facebook Login Page to Steal Credentials
A rapidly evolving campaign is using a Browser-in-the-Browser (BitB) overlay to impersonate Facebook’s login and siphon user credentials. The lure hinges on a deceptive CAPTCHA challenge that seamlessly morphs into a counterfeit Facebook session window, duping victims across desktops and…
Bulletproof Hosting Provider Aeza Group Shifting Their Infrastructure to New Autonomous System
Following U.S. Treasury sanctions imposed on July 1, 2025, the notorious bulletproof hosting provider Aeza Group has rapidly migrated its infrastructure to a new autonomous system in an apparent attempt to evade enforcement measures. Cybersecurity researchers at Silent Push detected…
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
Google Forms, praised for friction-free data collection, has become the unlikely staging ground for rapidly spreading crypto-phishing campaign. First detected in late-2024 but surging in Q2 2025, the ploy begins with an unsolicited email containing a legitimate‐looking forms.gle link that…
Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials
Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes…
New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer
A newly uncovered campaign is exploiting gamers’ enthusiasm for off-beat indie titles to plant credential-stealing malware on machines. Branded installers for nonexistent games such as “Baruda Quest,” “Warstorm Fire,” and “Dire Talon” are pushed through slick YouTube trailers and Discord…
Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter to Infiltrate Organizations
A sophisticated espionage campaign dubbed “Fire Ant” demonstrates previously unknown capabilities in compromising VMware virtualization infrastructure. Since early 2025, this threat actor has systematically targeted VMware ESXi hosts, vCenter servers, and network appliances using hypervisor-level techniques that evade traditional endpoint…