Spyware iPhone Toolkit, Extortion Emails, and Major Phishing Platform Takedown

Security researchers have discovered a powerful iPhone hacking toolkit that may be used by espionage groups and cybercriminals. The toolkit, known as Coruna, contains several exploit chains capable of targeting older versions of Apple’s iOS operating system. Researchers found that the framework can identify the type of iPhone and operating system being used, then deliver […]

Hackers Target Government Organizations Using OAuth Redirect Abuse

Microsoft has warned about a phishing campaign that primarily targets government and public-sector organizations by abusing the redirection feature in OAuth authentication. OAuth is widely used to allow users to log in to websites or applications using existing accounts without sharing their passwords. In this campaign, attackers exploit the legitimate redirect function within the OAuth […]

Hacktivist DDoS Attacks Target Organizations Across Multiple Countries

A recent wave of hacktivist activity has resulted in 149 distributed denial-of-service (DDoS) attacks targeting 110 organizations in 16 different countries. The attacks occurred during a period of heightened geopolitical tension following a coordinated military campaign involving the United States and Israel against Iran. Cybersecurity researchers observed that the attacks were largely politically motivated and […]

Study Reveals Critical Weaknesses in Password Manager Recovery Systems

A recent cybersecurity study has revealed serious vulnerabilities in several widely used cloud-based password managers, showing that many of the built-in recovery mechanisms can be exploited by attackers under certain conditions. The research found that popular services such as Bitwarden, Dashlane, and LastPass are susceptible to a range of password recovery attacks that could compromise […]

New Android Firmware Backdoor “Keenadu” Deeply Infects Tablets Worldwide

Cybersecurity researchers have uncovered a sophisticated new Android malware strain called Keenadu that is deeply embedded in the firmware of various Android tablets and can give attackers extensive control over infected devices. Unlike typical threats that arrive through malicious apps, Keenadu is implanted into the operating system during the firmware build process, meaning it can […]

Malicious Chrome Extensions Found Stealing Emails, Business Data, and Browsing History

Security researchers have uncovered a widespread campaign involving malicious browser extensions on the Google Chrome platform that are designed to steal sensitive information from users and organizations. These extensions, many of which were disguised as legitimate productivity tools or AI assistants, are capable of siphoning off email content, business analytics, two-factor authentication details, and users’ […]

Cybercriminals Abuse LinkedIn Messages to Spread RAT Malware

Cybersecurity experts have uncovered a sophisticated phishing campaign that uses LinkedIn’s private messaging feature to deliver harmful software to unsuspecting targets. Instead of relying on traditional email phishing, attackers first reach out to users through LinkedIn messages, building a sense of trust before introducing malicious files. The campaign specifically targets high-value individuals and professionals by […]

How Cloud Outages Can Disrupt the Internet and Business Operations

Recent high-profile outages involving major cloud service providers have shown just how interconnected and fragile modern internet infrastructure can be. When platforms such as Amazon Web Services, Microsoft Azure, or Cloudflare experience problems, the effects are felt far beyond the cloud provider itself. Websites, applications, and online workflows that depend on these services can suddenly […]