-
Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft Threat Intelligence reveals how Russian hacking group Forest Blizzard uses home routers for DNS hijacking and spying.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Netskope Threat Labs report a new ClickFix attack using fake CAPTCHAs to deploy Tor-backed NodeJS malware and drain crypto wallets on Windows.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
REF1695 hackers spread Monero mining malware via fake non-profit installers, using stealth tactics to evade detection and hijack systems for profit.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
GrafanaGhost is a critical vulnerability in Grafana’s AI components that uses indirect prompt injection and protocol-relative URL bypasses to exfiltrate data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New Phishing scam uses fake missile alerts and the ongoing conflict involving Iran to target users with QR codes and fake government emails to steal Microsoft passwords.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cloudflare launches EmDash CMS, an AI-powered platform built to fix WordPress security flaws with sandboxed plugins, serverless scaling, and passkey auth.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers and red teams adopt workflow automation to cut alert fatigue, enrich data, and scale operations across SOC, intel and recon tasks.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without suspicion.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


