A major security flaw affecting millions of Bluetooth headphones and earbuds has been discovered, allowing attackers to remotely hijack devices and spy on users without requiring any authentication or pairing. The vulnerabilities, identified by cybersecurity researchers at ERNW, affect devices…
Tag: Cyber Security News
DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads
DragonForce ransomware has emerged as one of the most sophisticated threats in the cybercriminal ecosystem, transforming from a hacktivist collective into a mature Ransomware-as-a-Service (RaaS) operation since its debut in December 2023. The group initially gained notoriety through ideologically driven…
New Report Unveils Most of The Ransomware Attacks Targeting Organizations Via Exploited Vulnerabilities
A comprehensive analysis of the global ransomware landscape has revealed that exploited vulnerabilities remain the dominant attack vector, accounting for 32% of all successful ransomware incidents targeting organizations worldwide. This marks the third consecutive year that vulnerability exploitation has topped…
10 Best Android Password Managers 2025
Looking for the best Android password managers in 2025? You’re in the right place. With growing online threats and more accounts than ever, using a reliable Android password manager is essential to protect your digital identity. Whether you’re storing credentials,…
Zig Strike – An Offensive Toolkit to Create Payloads and Bypass AV, XDR/EDR Detections
Zig Strike is a sophisticated offensive toolkit designed to bypass advanced security solutions, including Anti-Virus (AV), Next-Generation Antivirus (NGAV), and Endpoint Detection and Response (XDR/EDR) systems. This open-source toolkit represents a significant evolution in red team capabilities, leveraging the modern Zig programming…
RansomHub Ransomware Attacking RDP Servers Using Mimikatz and Advanced IP Scanner Tools
A recent incident response investigation from THE DFIR report has revealed the sophisticated tactics employed by RansomHub ransomware operators in a coordinated attack campaign that compromised an entire corporate network through an exposed Remote Desktop Protocol (RDP) server. The attack,…
Scattered Spider Hackers Actively Attacking Aviation and Transportation Firms
Cybersecurity experts and federal authorities are sounding urgent alarms as the notorious Scattered Spider hackers have pivoted to targeting the aviation and transportation sectors, marking a dangerous escalation in their operations. The FBI has confirmed that the cybercriminal group, also…
25 Best Managed Security Service Providers (MSSP) in 2025
Managed Security Service Providers (MSSPs) are specialized companies that deliver outsourced cybersecurity services to protect businesses from evolving cyber threats. These providers offer a range of services, including 24/7 threat monitoring, incident response, vulnerability management, and compliance support. MSSPs help…
Beware of Trending TikTok Videos That Promotes Pirated Apps Deliver Stealer Malware
Cybercriminals have discovered a new frontier for malware distribution by weaponizing TikTok’s massive user base and algorithmic reach. A sophisticated social engineering campaign has emerged that leverages AI-generated videos to trick users into downloading dangerous information-stealing malware disguised as software…
Threat Actors Behind GIFTEDCROOK Stealer Coverted It To an Intelligence-Gathering Tool
The cyber-espionage landscape targeting Ukraine has witnessed a significant evolution with the transformation of GIFTEDCROOK malware from a rudimentary browser credential stealer into a sophisticated intelligence-gathering platform. Initially discovered as a basic infostealer in early 2025, this malware has undergone…