This week’s ThreatsDay covers supply chain attacks, fake help desks, wiper malware, AI prompt traps, RMM abuse, phishing kits ...
PhantomCore exploited three TrueConf flaws since September 2025, enabling remote access and lateral movement across Russian ...
Attackers exploit Microsoft Teams and Snow malware to steal credentials and take over enterprise networks through social ...
A newly identified threat group, UNC6692, has been caught running a sophisticated cyberattack campaign that uses Microsoft ...
Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated ...
This is where honey-pot wallets come into the picture. Rather than anticipating an attack, you can create a wallet that looks ...
Fake Antigravity downloads are enabling fast account takeovers using hidden malware and stolen session cookies.
Learn the most common cryptocurrency scam scripts, from fake investments to romance fraud, and how to recognize warning signs ...
The tactic, known as "nationality shopping", lets migrants claim origins from high-grant countries such as Eritrea or Iran.
A malware campaign which targets macOS systems, distributed using a ClickFix attack, has evolved to exploit Script Editor as the execution vector rather than the typical Terminal-based point of ...
A disgruntled security researcher has made good on a threat. A security researcher going by the aliases Chaotic Eclipse and Nightmare-Eclipse published exploit code for a Windows privilege escalation ...
PCWorld reports on the ‘BlueHammer’ zero-day vulnerability that allows attackers to potentially take over Windows computers through privilege escalation. A frustrated security researcher published the ...