September 24, 2025

Boyd Gaming Data Breach Exposes 184,000 Personal Records

The Boyd Gaming data breach has become another major cybersecurity incident in the casino industry. Boyd Gaming, which operates 28 casinos across 10 U.S. states, confirmed that a recent cyberattack exposed the personal data of more than 184,000 individuals. The breach disrupted critical IT systems and forced the company to take immediate containment measures. This attack highlights how vulnerable the

Boyd Gaming Data Breach
September 23, 2025

Ransomware Attack Causes European Airport Disruptions

A ransomware attack has disrupted operations at several major airports across Europe, creating widespread delays and cancellations for travelers. The cybercriminals targeted key IT systems that support check-ins, boarding, and baggage handling. As staff scrambled to implement manual workarounds, passengers faced hours of uncertainty and missed connections. This large-scale disruption underscores the aviation sector’s growing dependence on digital infrastructure —

airport ransomware attack
September 19, 2025

SystemBC Malware Turns VPS Into Proxy Networks

SystemBC malware is evolving into a powerful tool for cybercriminals. First spotted in 2019, it has shifted from being a stealthy backdoor to a full-fledged proxy-building system. Today, attackers deploy it on compromised VPS servers to create large proxy networks. This development allows them to hide malicious traffic, making it harder for defenders to trace cyberattacks. How SystemBC Malware Operates

SystemBC Malware
September 17, 2025

FileFix Attack Uses Steganography to Deliver StealC

A new FileFix attack campaign is targeting users with a blend of social engineering and advanced malware delivery. The operation impersonates Meta support notices to convince victims they must take action. Instead of fixing a problem, the tricked users end up executing hidden PowerShell commands. These commands launch a sophisticated chain of events that ends with the StealC infostealer installed

FileFix attack
September 15, 2025

VoidProxy Phishing Targets Microsoft 365 & Google Accounts

The VoidProxy phishing attack is an emerging cyber threat targeting cloud accounts on Microsoft 365 and Google platforms. This attack service enables attackers to bypass multi-factor authentication (MFA) and steal sensitive credentials. VoidProxy is designed for simplicity, allowing low-skill cybercriminals to deploy phishing campaigns with minimal effort. As organizations increasingly rely on cloud services, understanding this threat and implementing preventive

VoidProxy Phishing
September 14, 2025

Jaguar Land Rover Data Breach Confirmed After Cyberattack

The Jaguar Land Rover data breach reveals the growing cybersecurity threats facing global automakers. The company confirmed that a recent cyberattack not only disrupted manufacturing but also compromised data. While the full scope remains unclear, the breach highlights the vulnerability of complex supply chains and the need for stronger digital defenses across the automotive sector. Cyberattack Causes Factory Shutdowns The

Jaguar Land Rover data breach
September 13, 2025

Akira Ransomware SonicWall Bug Exploited Despite Patches

The Akira ransomware SonicWall bug exploitation highlights the ongoing danger of incomplete patching in cybersecurity. Attackers are actively abusing the critical flaw CVE-2024-40766, first disclosed in August 2024. While SonicWall released fixes over a year ago, many organizations remain exposed due to overlooked remediation steps, leaving them vulnerable to fresh ransomware campaigns. The Flaw Behind the Attacks CVE-2024-40766 is a

Akira Ransomware
September 12, 2025

EggStreme Fileless Malware Targets Philippine Military

A newly identified threat named EggStreme fileless malware has been deployed by a suspected Chinese advanced persistent threat (APT) group. Researchers found the campaign targeting Philippine military systems, underlining the region’s rising geopolitical cyber risks. EggStreme stands out for its stealth. Instead of leaving files on disk, it executes in memory, making detection extremely difficult. This fileless design highlights the

EggStreme Fileless Malware
September 11, 2025

AsyncRAT Exploits ConnectWise in New Malware Campaign

AsyncRAT exploits ConnectWise in a recent malware campaign that highlights how attackers weaponize legitimate remote access tools. Security researchers uncovered a layered attack chain that delivered the trojan through fileless techniques, persistence tricks, and data theft. The operation reveals the growing sophistication of remote access trojans and the increasing risks for businesses relying on widely used IT management software. How

AsyncRAT
September 10, 2025

Salty2FA Phishing Kit Targets Enterprises With MFA Bypass

The Salty2FA phishing kit has quickly gained attention as one of the most dangerous phishing tools of 2025. Unlike older phishing kits that only capture usernames and passwords, this service also bypasses multiple forms of multi-factor authentication (MFA). That ability makes stolen credentials far more valuable and leaves enterprises exposed to full-scale account takeovers. What Makes Salty2FA Different? Salty2FA is

Salty2FA