Cybercriminals Exploit IT Help Desks as Entry Point for Attacks
Cybercriminals are increasingly pretending to be IT staff or trusted authorities to trick employees into giving them access to sensitive systems, recent cybersecurity reports reveal. These attackers rely on “authority [...]
Cisco Patches Critical SISF Vulnerability Affecting Multiple Products
Cisco has issued critical security updates to address a vulnerability in its Switch Integrated Security Features (SISF), which affects several of its software platforms. The flaw could let attackers on [...]
Agenda Ransomware Adds SmokeLoader & NETXLOADER
The Agenda ransomware group (Qilin) ramped up attacks in early 2025, hitting key sectors worldwide with tools like NETXLOADER and SmokeLoader, Trend Micro reports. Agenda Ransomware The Agenda ransomware group, [...]
Wormable Linux Rootkit Steals SSH Keys, Escalates Privileges
Researchers at ANY.RUN have discovered a complex attack using the Diamorphine rootkit to install a crypto miner on Linux systems, showing how open-source tools are being misused in cyberattacks. Their [...]
Pahalgam Attack Lure Used in Cyberattacks Against Indian Government
In a targeted cyber espionage campaign, attackers are using fake documents referencing the recent Pahalgam attack to go after Indian government personnel. Discovered in early May 2025, the campaign relies [...]
Get Social