Boyd Gaming Data Breach Exposes 184,000 Personal Records
The Boyd Gaming data breach has become another major cybersecurity incident in the casino industry. Boyd Gaming, which operates 28 casinos across 10 U.S. states, confirmed that a recent cyberattack exposed the personal data of more than 184,000 individuals. The breach disrupted critical IT systems and forced the company to take immediate containment measures. This attack highlights how vulnerable the

Ransomware Attack Causes European Airport Disruptions
A ransomware attack has disrupted operations at several major airports across Europe, creating widespread delays and cancellations for travelers. The cybercriminals targeted key IT systems that support check-ins, boarding, and baggage handling. As staff scrambled to implement manual workarounds, passengers faced hours of uncertainty and missed connections. This large-scale disruption underscores the aviation sector’s growing dependence on digital infrastructure —

SystemBC Malware Turns VPS Into Proxy Networks
SystemBC malware is evolving into a powerful tool for cybercriminals. First spotted in 2019, it has shifted from being a stealthy backdoor to a full-fledged proxy-building system. Today, attackers deploy it on compromised VPS servers to create large proxy networks. This development allows them to hide malicious traffic, making it harder for defenders to trace cyberattacks. How SystemBC Malware Operates

FileFix Attack Uses Steganography to Deliver StealC
A new FileFix attack campaign is targeting users with a blend of social engineering and advanced malware delivery. The operation impersonates Meta support notices to convince victims they must take action. Instead of fixing a problem, the tricked users end up executing hidden PowerShell commands. These commands launch a sophisticated chain of events that ends with the StealC infostealer installed

VoidProxy Phishing Targets Microsoft 365 & Google Accounts
The VoidProxy phishing attack is an emerging cyber threat targeting cloud accounts on Microsoft 365 and Google platforms. This attack service enables attackers to bypass multi-factor authentication (MFA) and steal sensitive credentials. VoidProxy is designed for simplicity, allowing low-skill cybercriminals to deploy phishing campaigns with minimal effort. As organizations increasingly rely on cloud services, understanding this threat and implementing preventive

Jaguar Land Rover Data Breach Confirmed After Cyberattack
The Jaguar Land Rover data breach reveals the growing cybersecurity threats facing global automakers. The company confirmed that a recent cyberattack not only disrupted manufacturing but also compromised data. While the full scope remains unclear, the breach highlights the vulnerability of complex supply chains and the need for stronger digital defenses across the automotive sector. Cyberattack Causes Factory Shutdowns The

Akira Ransomware SonicWall Bug Exploited Despite Patches
The Akira ransomware SonicWall bug exploitation highlights the ongoing danger of incomplete patching in cybersecurity. Attackers are actively abusing the critical flaw CVE-2024-40766, first disclosed in August 2024. While SonicWall released fixes over a year ago, many organizations remain exposed due to overlooked remediation steps, leaving them vulnerable to fresh ransomware campaigns. The Flaw Behind the Attacks CVE-2024-40766 is a

EggStreme Fileless Malware Targets Philippine Military
A newly identified threat named EggStreme fileless malware has been deployed by a suspected Chinese advanced persistent threat (APT) group. Researchers found the campaign targeting Philippine military systems, underlining the region’s rising geopolitical cyber risks. EggStreme stands out for its stealth. Instead of leaving files on disk, it executes in memory, making detection extremely difficult. This fileless design highlights the

AsyncRAT Exploits ConnectWise in New Malware Campaign
AsyncRAT exploits ConnectWise in a recent malware campaign that highlights how attackers weaponize legitimate remote access tools. Security researchers uncovered a layered attack chain that delivered the trojan through fileless techniques, persistence tricks, and data theft. The operation reveals the growing sophistication of remote access trojans and the increasing risks for businesses relying on widely used IT management software. How

Salty2FA Phishing Kit Targets Enterprises With MFA Bypass
The Salty2FA phishing kit has quickly gained attention as one of the most dangerous phishing tools of 2025. Unlike older phishing kits that only capture usernames and passwords, this service also bypasses multiple forms of multi-factor authentication (MFA). That ability makes stolen credentials far more valuable and leaves enterprises exposed to full-scale account takeovers. What Makes Salty2FA Different? Salty2FA is
