Vishing Rises After Qantas

Screenshot 2025 07 04 221606

Australia’s Qantas recently addressed a major data breach affecting nearly six million customer records. The breach traced back to vishing-phone-based social engineering-targeting third-party call centers. Qantas’s investigation with federal authorities uncovered that attackers impersonated agents and bypassed authentication controls to access personal data. This incident highlights the growing trend of voice-driven cyberattacks and exposes vulnerabilities […]

Ransomware Attacks Skyrocket

Twitter Post Ransomware Attacks Are Rising Rapidly in 2025

A recent report highlights a staggering 213 percent increase in ransomware attacks during the first quarter of 2025, affecting over 2,300 organizations globally. This surge reflects not only the persistence of cybercriminals but also their evolving tactics and broader target selection – hitting sectors from healthcare to manufacturing, finance, and beyond. The infamous Cl0p gang […]

Ivanti Zero Day Hits France

Twitter Post Critical Infrastructure Under Fire Today

Critical Infrastructure Under Fire: Lessons from the Ivanti Zero-Day Exploits On July 3rd, cybersecurity researchers revealed a sophisticated cyberattack campaign targeting critical infrastructure in France. The attack leveraged three previously unknown (zero-day) vulnerabilities in Ivanti Connect Secure Appliances (CSA), enabling unauthorized access to sensitive networks. The campaign has been attributed to a nation-state threat group […]

Crypto Scams in Firefox

Screenshot 2025 07 02 234934

Mozilla Firefox add-on ecosystem has recently become the target of a sophisticated and dangerous attack. Over 40 fake cryptocurrency wallet extensions were discovered in the Firefox Add-ons Store, mimicking popular digital wallets such as Ledger, MetaMask, Trezor, and Rabby. These malicious add-ons are designed with one purpose – to steal users’ seed phrases and drain […]

Defending Infrastructure from Cyber Threats

Protecting Critical Infrastructure from Emerging Nation State Cyber Threats

In today’s interconnected world, cyber threats from nation-state actors pose significant risks to essential services and national security. Recent alerts from leading U.S. cybersecurity agencies warn of increasing activity by Iranian-affiliated cyber actors targeting vulnerable networks across government, energy, finance, healthcare, and technology sectors. These state-sponsored threats are sophisticated and persistent, using a variety of […]

SEC’s New Data Privacy Rules

How the SEC Is Redefining Data Privacy in Financial Services

Financial institutions are now operating under tighter scrutiny with the SEC’s newly adopted amendments to Regulation S‑P. These updates mark a significant shift in how broker-dealers, investment advisers, and transfer agents must safeguard client data, respond to security incidents, and notify affected individuals. This move comes in response to a growing number of cyber breaches […]

GIFTEDCROOK’s Silent Threat

Screenshot 2025 06 29 002926

On June 28, cybersecurity researchers confirmed that the GIFTEDCROOK malware has evolved from a basic data stealer into a powerful intelligence-gathering weapon. Once known for stealing browser credentials and cookies, GIFTEDCROOK is now targeting sensitive documents from high-value sectors like government, finance, and healthcare. Recent attacks show that threat actors are actively using this malware […]

New York’s Cyber Mandate

Screenshot 2025 06 28 194930

The insurance industry is facing an unprecedented surge in Cyber threats against public agencies have reached a critical tipping point. In response, New York State has enacted a new law that marks a major leap in government cyber accountability. The legislation now mandates that municipalities and local public authorities report cyberattacks within 72 hours and […]

LapDogs & ORB Espionage

Screenshot 2025 06 27 231653

In the dim corridors of global cyber activity, a new actor has emerged not as a singular attacker, but as a silent, distributed network weaving through homes and small offices. The LapDogs campaign, uncovered by SecurityScorecard’s STRIKE team, presents a chilling example of how inconspicuous devices can be transformed into powerful espionage tools. This discovery reveals over […]

African Banks Under Siege

Screenshot 2025 06 26 225137

Cybersecurity threats are no longer limited to sophisticated malware built in the shadows. Increasingly, open-source tools-widely used for legitimate testing and development-are being exploited by cybercriminals to breach financial institutions across Africa. This evolution marks a significant shift in attacker behavior. Open-source frameworks such as Metasploit, Cobalt Strike, and Empire are enabling attackers to conduct […]