August 19, 2025

Charon Ransomware Tactics Show APT-Level Sophistication

Charon ransomware tactics highlight a dangerous shift in cybercrime. The new malware combines traditional ransomware methods with advanced persistent threat (APT) techniques. Security researchers have already linked its activity to targeted attacks on organizations in the Middle East, especially in aviation and public services. This evolution shows how ransomware is moving beyond simple extortion. How Charon Ransomware Operates Charon ransomware

Charon Ransomware
August 16, 2025

Crypto24 Ransomware Uses Custom EDR Evasion in Global Attack

Crypto24 ransomware is rapidly emerging as one of the most advanced cybercrime operations of the year. Security experts report that the group is executing well-planned attacks against large enterprises across multiple continents. Its operations combine tailored malware, legitimate administrative tools, and advanced evasion techniques to bypass industry-leading endpoint defenses. This calculated approach enables the attackers to remain hidden while exfiltrating

Crypto24 Ransomware
August 15, 2025

Allianz Life Data Leak Exposes Millions in Salesforce Cyberattack

The Allianz Life data leak has put millions of customers and partners at risk after attackers breached a cloud-based CRM platform. The stolen information was later released online in what experts describe as one of the most significant Salesforce-related incidents to date. From Breach to Public Leak In mid-July 2025, Allianz Life, a major U.S. insurance provider, confirmed that a

allianz life data breach
August 12, 2025

BadCam BadUSB Attack Turns Linux Webcams Into Threats

The newly discovered BadCam BadUSB attack exposes a dangerous flaw in certain Linux-based webcams. Security researchers warn that the vulnerability could allow attackers to reprogram webcams into malicious USB devices, enabling persistent threats that survive even after system reinstallation. This finding has raised concerns over USB device trust and firmware security. How the BadCam Attack Works Security firm Eclypsium identified

BadCam BadUSB Attack
August 11, 2025

Google Ads Data Breach Exposes Millions of Business Records

Google has confirmed a significant data breach involving information about potential Google Ads customers. The breach targeted one of the company’s Salesforce CRM instances, which is used to manage and track communication with prospective advertisers. According to Google, the attack took place in June 2025 and was carried out by the hacking group known as ShinyHunters, also referred to as

Google Ads Data Breach
August 9, 2025

GreedyBear Steals $1M in Crypto via Browser Extensions

A new cybercrime operation called GreedyBear has looted over $1 million in cryptocurrency through an elaborate scheme involving malicious browser extensions, cracked software, and deceptive crypto-themed websites. According to cybersecurity researchers at Lookout, this campaign represents one of the most coordinated and multifaceted threats targeting digital asset holders in recent months. Fake Wallet Extensions Flood Browser Stores GreedyBear's primary weapon

GreedyBear
August 6, 2025

Pandora Data Breach Linked to Salesforce Attack Campaign

Jewelry giant Pandora has confirmed a data breach following a targeted attack on its Salesforce environment. The breach is part of a larger wave of cyberattacks orchestrated by cybercriminal groups exploiting misconfigured or vulnerable Salesforce customer accounts. Pandora disclosed the incident in customer notifications sent out on August 5, 2025. While the company emphasized that its core infrastructure was not

Pandora Data Breach
August 4, 2025

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Play Store Pages

The Android threat landscape has a dangerous new player. PlayPraetor is a highly sophisticated Remote Access Trojan (RAT) that has already compromised over 11,000 devices worldwide. Distributed through convincing fake Play Store pages, SMS phishing campaigns, and sponsored Meta ads, this malware is spreading rapidly, with over 2,000 new infections per week. A Look at the Distribution Tactics PlayPraetor isn’t

PlayPraetor Android Trojan
August 3, 2025

ShinyHunters Salesforce Breach Hits Qantas, Allianz Life, and LVMH

The hacking group ShinyHunters takes the spotlight again. This time tied to a wave of social engineering attacks that targeted Salesforce systems at major companies like Qantas, Allianz Life, and LVMH. The group exploited human trust, not software flaws, to access sensitive customer data across industries. Vishing Attacks Open the Door According to reports, attackers used vishing (voice phishing) to

ShinyHunters
August 1, 2025

ToxicPanda Android Malware Infects Thousands Across Europe

A new wave of the ToxicPanda Android malware is sweeping through Europe, targeting mobile banking users with advanced theft and evasion tactics. First identified in 2022, this banking trojan has evolved into one of the most dangerous threats for Android users, using fake overlays and accessibility services to steal login credentials and bypass security. Recent reports show over 4,500 devices

ToxicPanda Malware