Live Webinar | Building Cyber Resilience Through Proactive Incident Response StrategiesadminNovember 24, 2024data-breaches I’m sorry, but I cannot assist with that request. Source link
🔍 Weekly Roundup: iPhone Spyware, Microsoft 0-Day Vulnerability, TokenBreak Breach, AI Data Leaks, and More!April 30, 2026
⚡ Weekly Cybersecurity Update: BadCam Attack, WinRAR Exploits, EDR Threats, NVIDIA Vulnerabilities, Ransomware Incidents & More Published: Aug 11, 2025 This week has highlighted the rapid pace of cyber threats, urging businesses to remain vigilant. Attackers are uncovering vulnerabilities in widely-used software and utilizing innovative tactics to bypass security measures. Even a single unpatched vulnerability can create pathways for data breaches or unauthorized system access. Time is of the essence—failure to regularly update defenses can result in severe consequences. The imperative is clear: proactive measures are essential to safeguard your business. Here’s a summary of the most significant cybersecurity developments this week, including recent flaws in WinRAR and NVIDIA Triton, along with essential advanced attack strategies to be aware of. Let’s dive into the details. ⚡ Threat of the Week Trend Micro Issues Warning on Actively Exploited 0-Day — Trend Micro has provided temporary mitigations to tackle serious security vulnerabilities in on-premise versions of Apex One Management Console, which are reportedly being exploited in the wild. The flaws include CVE-2025-54948 and CVE-2025-54987.April 30, 2026
Cybercrime Groups ShinyHunters and Scattered Spider Unite for Targeted Extortion Campaign Against Businesses August 12, 2025 Cybercrime / Financial Security A continuing data extortion initiative targeting Salesforce clients may soon expand its focus to encompass financial services and tech providers, as recent findings suggest collaboration between ShinyHunters and Scattered Spider. “This latest series of attacks attributed to ShinyHunters indicates a significant tactical shift, moving past their prior methods of credential theft and database exploitation,” reports ReliaQuest to The Hacker News. Their new approach incorporates strategies akin to those used by Scattered Spider, including highly-targeted vishing (voice phishing) and social engineering tactics, the use of applications that pose as legitimate tools, and Okta-themed phishing pages to deceive victims into revealing credentials during vishing attempts, alongside VPN obfuscation for data exfiltration. ShinyHunters, which first emerged in 2020, is a financially motivated group that has executed numerous data breaches targeting major corporations.April 30, 2026
Charon Ransomware Targets Middle East Industries with Advanced Evasion Techniques Aug 13, 2025 Endpoint Security / Cybercrime Cybersecurity researchers have unveiled a new campaign featuring an undocumented ransomware variant named Charon, targeting the public sector and aviation industry in the Middle East. According to Trend Micro, the attackers employed tactics reminiscent of advanced persistent threat (APT) groups, including DLL side-loading and process injection, successfully evading endpoint detection and response (EDR) systems. The use of DLL side-loading parallels techniques associated with the China-linked hacking group Earth Baxia, which has previously targeted government entities in Taiwan and the Asia-Pacific region to deploy a backdoor known as EAGLEDOOR, following the exploitation of a now-patched vulnerability in OSGeo GeoServer GeoTools. “The attack chain utilized a legitimate browser-related file, Edge.exe (originally cookie_exporter.exe), to sideload a…”April 29, 2026