Category cyber-attacks

This AI Agent Is Built to Stay in Line

The Rise and Risks of AI Agents in Digital Management Recently, artificial intelligence agents, exemplified by applications like OpenClaw, have surged in popularity as they promise to streamline personal digital management. These agents can generate customized news summaries, serve as intermediaries for customer service interactions, and assist in managing tasks…

Read MoreThis AI Agent Is Built to Stay in Line

Additional Hacking Groups Discovered Exploiting SMB Vulnerability Weeks Prior to WannaCry

The cybersecurity landscape has been shaken following the April leak of zero-day vulnerabilities and hacking tools by the Shadow Brokers, reportedly associated with the NSA’s Equation Group. This disclosure has led to numerous hacking groups and individual cybercriminals taking initiative to exploit these vulnerabilities for various malicious purposes. The release…

Read MoreAdditional Hacking Groups Discovered Exploiting SMB Vulnerability Weeks Prior to WannaCry

Report Reveals Only 1% of Security Vulnerabilities Fuel Most Cyberattacks in 2025

An extensive investigation by VulnCheck has revealed that, despite the annual surge in reported security vulnerabilities, most remain unexploited in real-world scenarios. Of the staggering 48,000 security flaws documented in 2025, only 1% were actively targeted, signaling a concerning trend where a limited set of vulnerabilities inflict the majority of…

Read MoreReport Reveals Only 1% of Security Vulnerabilities Fuel Most Cyberattacks in 2025

First-Ever Malware Discovered Utilizing Intel AMT Tool to Evade Firewalls and Steal Data

On the cybersecurity landscape, exploiting visible networks often falls to the realm of well-resourced, state-sponsored hacking groups. While infiltrating corporate systems may not be particularly challenging for these actors, ensuring the longevity of their access and maintaining undetectable communication channels poses a significant hurdle. A cyber-espionage group known as **Platinum**…

Read MoreFirst-Ever Malware Discovered Utilizing Intel AMT Tool to Evade Firewalls and Steal Data

New Fileless Ransomware with Code Injection Capabilities Discovered in the Wild

Emerging Threat: Fileless Ransomware “Sorebrect” Targets Enterprises Cybercriminals are evolving, leveraging increasingly sophisticated tactics to execute attacks. A recent report highlights the emergence of a fileless ransomware strain known as “Sorebrect.” Unlike traditional ransomware, which often relies on files to infect systems, Sorebrect injects malicious code directly into legitimate processes,…

Read MoreNew Fileless Ransomware with Code Injection Capabilities Discovered in the Wild

UK Parliament Targeted by Cyberattack, Affecting Up to 90 MPs’ Email Accounts

Cyber Attack Targets UK Parliament Email System In a significant cybersecurity incident, the email system of the UK Houses of Parliament was breached on Friday morning, affecting at least 90 accounts belonging to Members of Parliament (MPs), their staff, and other parliamentary personnel. Initial investigations suggest that many of these…

Read MoreUK Parliament Targeted by Cyberattack, Affecting Up to 90 MPs’ Email Accounts