Daily Security Review
Episodes
Multi-Stage Phishing Attacks Now Use Google InfrastructureâHereâs How
02 Jun 2025
Contributed by Lukas
Recent phishing campaigns have entered a new phaseâone where trust is weaponized. In this episode, we break down how cybercriminals are exploiting l...
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool
02 Jun 2025
Contributed by Lukas
In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test a...
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
30 May 2025
Contributed by Lukas
ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The...
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
30 May 2025
Contributed by Lukas
In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went ...
Unbound Raises $4M to Secure Generative AI in the Enterprise
30 May 2025
Contributed by Lukas
In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterp...
Windows Updates, Reimagined: Inside Microsoftâs Unified Orchestration Push
29 May 2025
Contributed by Lukas
Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into th...
Systemd as a Weapon: How PumaBot Exploits Linux Persistence
29 May 2025
Contributed by Lukas
Linux systems are under siegeâparticularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based...
The LexisNexis Breach: 364,000 Records Exposed via GitHub
29 May 2025
Contributed by Lukas
On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutionsâexposing the personal data of over ...
Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions
28 May 2025
Contributed by Lukas
On this episode, we dissect the ransomware attack that brought MathWorksâa cornerstone software provider for engineers, scientists, and educatorsâ...
Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations
28 May 2025
Contributed by Lukas
The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fue...
DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726
28 May 2025
Contributed by Lukas
In this episode, we unpack a critical supply chain breach thatâs rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilit...
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement
27 May 2025
Contributed by Lukas
This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law e...
Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected
27 May 2025
Contributed by Lukas
In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attackâone of the most significant healthcare ...
How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data
27 May 2025
Contributed by Lukas
In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealersâStealc, Vidar, and LummaC2. These ...
The Great Screenshot Scandal: Microsoft Recall and Signalâs DRM Shield
26 May 2025
Contributed by Lukas
In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoftâs W...
Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting
26 May 2025
Contributed by Lukas
In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanize...
FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Groupâs Law Firm Attacks
26 May 2025
Contributed by Lukas
In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)âalso known as Luna Mothâa cybercriminal outfit that has shifte...
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
23 May 2025
Contributed by Lukas
A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-L...
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown
23 May 2025
Contributed by Lukas
In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the back...
From TikTok to Total Compromise: The Rise of Social Media Infostealers
23 May 2025
Contributed by Lukas
In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their dis...
Kettering Health Breached: What the Interlock Ransomware Group Did and Why It Matters
22 May 2025
Contributed by Lukas
In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlo...
Deepfake Threats, Mobile Biometrics, and the Future of Trust
22 May 2025
Contributed by Lukas
As digital deception evolves, so must our defenses. In this episode, we dive deep into the escalating battle for trust in our increasingly connected w...
119,000 ICS Devices Exposed: The Internetâs Hidden Infrastructure Risk
22 May 2025
Contributed by Lukas
In this episode, we dive into a growing cybersecurity crisis: the exposure of Industrial Control Systems (ICS) on the public internet. These systems p...
Arla Foods Upahl Site Hit by CyberattackâWhat It Means for Food Supply Chains
20 May 2025
Contributed by Lukas
In May 2025, a cyberattack disrupted operations at Arla Foodsâ major dairy facility in Upahl, Germanyâhalting skyr production, impacting local IT ...
Bypassing Antivirus: What Defendnot Reveals About the Weak Spots in Windows Security
20 May 2025
Contributed by Lukas
In this episode, we dissect one of the most advanced Windows security evasion tools released in recent memory: Defendnot. Designed to exploit undocume...
BreachRx Raises $15M to Automate the Chaos of Incident Response
20 May 2025
Contributed by Lukas
In this episode, we dive into BreachRxâs $15 million Series A raise â and what it means for the future of enterprise cybersecurity incident respon...
110,000+ Records Compromised: The NRS Cybersecurity Failure
19 May 2025
Contributed by Lukas
In this episode, we unpack the 2024 cybersecurity incident that rocked the debt collection and healthcare sectors: the massive data breach at Nationwi...
CISA Flags Chrome Vulnerability CVE-2025-4664: Patch Before June 5th
19 May 2025
Contributed by Lukas
In this episode, we break down the recently discovered and actively exploited Chrome vulnerability CVE-2025-4664âa high-severity flaw stemming from ...
483,000 Patients at Risk: Catholic Health Vendor Breach Exposes Critical Data
19 May 2025
Contributed by Lukas
In this episode, we dive deep into a newly disclosed healthcare data breach affecting over 483,000 patients of Catholic Health, stemming from a miscon...
Chrome's New Vulnerability CVE-2025-4664: A Security Flaw That Can Lead to Account Takeover
16 May 2025
Contributed by Lukas
In this episode, we take an in-depth look at the newly discovered CVE-2025-4664 vulnerability in Google Chromeâs Loader component. This high-severit...
Scattered Spider Targets UK and US Retailers: The Growing Threat to Major Brands
16 May 2025
Contributed by Lukas
In this episode, we dive deep into the recent wave of cyberattacks plaguing major UK retailers such as Marks & Spencer, Co-op, and Harrods, with a...
Proofpoint Acquires Hornetsecurity for $1B: A New Era in Microsoft 365 Security
16 May 2025
Contributed by Lukas
 In a major move within the cybersecurity space, Proofpoint has announced the acquisition of Hornetsecurity for over $1 billion. This deal significan...
Exploited in the Wild: SAP NetWeaver Zero-Days Hit Fortune 500
14 May 2025
Contributed by Lukas
In this episode, we dive into the active exploitation of two critical zero-day vulnerabilities in SAP NetWeaverâCVE-2025-31324 and CVE-2025-42999. T...
Checkout Chaos: Inside the ÂŁ3.5 Million-a-Day M&S Cyber-Shutdown
14 May 2025
Contributed by Lukas
The recent ransomware attack on Marks & Spencer (M&S) is a sobering example of the evolving cyber threat landscape confronting the retail indu...
Targeted iOS Attacks: The Zero-Days Apple Had to Patch Fast
14 May 2025
Contributed by Lukas
In this episode, we break down Appleâs massive May 2025 security update blitzâa sweeping patch release that spanned iOS, macOS, iPadOS, tvOS, visi...
Texas vs Google: The $1.4 Billion Wake-Up Call for Data Privacy Violations
13 May 2025
Contributed by Lukas
In this episode, we unpack the groundbreaking $1.4 billion privacy settlement between Google and the state of Texasânow the largest of its kind in U...
Marbled Dust's Zero-Day Exploit: Unveiling a TĂźrkiye-linked Espionage Campaign Against Kurdish Forces
13 May 2025
Contributed by Lukas
In April 2024, a sophisticated cyber espionage campaign orchestrated by the TĂźrkiye-linked hacker group, Marbled Dust, began exploiting a previously ...
TeleMessage Exploit: Inside the Messaging Flaw That Hit Coinbase and CBP
13 May 2025
Contributed by Lukas
In this episode, we dissect CVE-2025-47729, a critical vulnerability in TeleMessage, a message archiving app recently thrust into the spotlight due to...
Backdoored by âCheapâ AI: How Fake npm Packages Compromised Cursor IDE
12 May 2025
Contributed by Lukas
A new supply chain attack has emergedâthis time targeting macOS users of the Cursor AI code editor through rogue npm packages. In this episode, we b...
160,000 Victims Later: The Aspire USA Breach Under Valsoftâs Watch
12 May 2025
Contributed by Lukas
In this episode, we break down the February 2025 data breach that hit Valsoft Corporation, operating under the name AllTrust, through its subsidiary A...
rand-user-agent: The NPM Package That Opened a Backdoor
12 May 2025
Contributed by Lukas
In this episode, we break down the recent compromise of the rand-user-agent NPM packageâan attack that quietly turned a once-trusted JavaScript libr...
PipeMagic, Procdump, and Privilege Escalation: Tracking the Windows CLFS Exploit Chain
08 May 2025
Contributed by Lukas
A zero-day vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824, became the center of a global cybersecurity storm wh...
Pegasus Spyware, WhatsApp v. NSO Group, and the Global Battle for Data Privacy
08 May 2025
Contributed by Lukas
In this episode, we dive deep into the legal, technical, and geopolitical implications of the U.S. court ruling in WhatsApp v. NSO Groupâa landmark ...
How CodeAnt AI is Automating Code Reviews for 50+ Dev Teams
08 May 2025
Contributed by Lukas
AI tools are generating more code than ever â but whoâs reviewing it? In this episode, we spotlight CodeAnt AI, the fast-growing platform built to...
The Langflow Breach: How a Popular AI Tool Opened the Door to Hackers
07 May 2025
Contributed by Lukas
A newly disclosed zero-day vulnerability, CVE-2025-3248, is being actively exploited in the wildâand it's targeting Langflow, a popular open-source ...
Mirai Reloaded: Why CVE-2024-7399 Still Haunts Samsung Servers
07 May 2025
Contributed by Lukas
In this episode, we break down the active exploitation of CVE-2024-7399, a critical path traversal and arbitrary file upload vulnerability in Samsung ...
CVE-2025-31324: A Critical SAP Zero-Day in Active Exploitation
07 May 2025
Contributed by Lukas
A critical zero-day vulnerability â CVE-2025-31324 â is shaking the enterprise tech world. In this episode, we dive deep into the alarming exploi...
Another Day, Another Commvault Zero-Day: RCE, Path Traversal, and KEV Inclusions
06 May 2025
Contributed by Lukas
In this episode, we break down the anatomy of some of the most critical vulnerabilities threatening enterprise systems in 2025 â and the real-world ...
Kelly Benefits Breach: What 413,000 Exposed Records Teach Us About Cybersecurity
06 May 2025
Contributed by Lukas
In this episode, we dive deep into the massive data breach at Kelly Benefits, a payroll and benefits administrator that exposed the sensitive personal...
$491M Budget Cut: The White House Move That Could Reshape CISA
06 May 2025
Contributed by Lukas
 In this episode, we unpack the rising tensions surrounding the Cybersecurity and Infrastructure Security Agency (CISA) as it faces proposed budget c...
TikTok Fined âŹ530M: GDPR Breach Over Data Transfers to China
05 May 2025
Contributed by Lukas
The Irish Data Protection Commission (DPC) has fined TikTok a staggering âŹ530 million ($601 million) for violating the GDPR by transferring European...
Endor Labs Raises $93M to Cut AppSec Noise and Secure the Software Supply Chain
05 May 2025
Contributed by Lukas
In this episode, we explore the security challenges of the AI-driven software era and how Endor Labs is reshaping application security for the modern ...
CVE-2025-3928: How One Vulnerability Breached Commvaultâs Azure Stack
05 May 2025
Contributed by Lukas
In this episode, we take a deep dive into CVE-2025-3928âa critical vulnerability in the Commvault Web Server that enables remote attackers to deploy...
Nova Scotia Power, a Canadian Utility, Breached: A Global Warning for Critical Infrastructure
02 May 2025
Contributed by Lukas
On April 25, 2025, Nova Scotia Power, the provinceâs primary electricity provider, confirmed what many suspected: a cyber incident involving unautho...
SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs
02 May 2025
Contributed by Lukas
In a rare move, SentinelOne has publicly confirmed that it is under persistent attack from nation-state threat actors and ransomware gangs. This episo...
OpenEoX and the Future of End-of-Life Standardization in IT
02 May 2025
Contributed by Lukas
In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT envir...
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
30 Apr 2025
Contributed by Lukas
LayerX just raised another $11 million â and itâs not to build another antivirus. With $45 million in total funding, the company is betting that y...
$10.5M to Fight AI-Phishing: The Rise of Pistachioâs Cybersecurity Training Platform
30 Apr 2025
Contributed by Lukas
In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new fundingâbringing its to...
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
30 Apr 2025
Contributed by Lukas
In this episode, we dive deep into AirBorne â a critical set of vulnerabilities in Appleâs AirPlay protocol and SDK, recently uncovered by securit...
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
29 Apr 2025
Contributed by Lukas
The bots have taken overâand theyâre not just crawling your website. In this episode, we dig into the alarming reality that automated bots now gen...
From 1,382 to 4 Million: What VeriSource Didnât Know (or Say)
29 Apr 2025
Contributed by Lukas
In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits admin...
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
29 Apr 2025
Contributed by Lukas
Three actively exploited vulnerabilitiesâCVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom B...
Hard-Coded Havoc: The Fatal Flaws in Planetâs Network Devices
28 Apr 2025
Contributed by Lukas
A wave of critical vulnerabilities in Planet Technologyâs industrial switches and network management systems could let attackers hijack devices, ste...
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
28 Apr 2025
Contributed by Lukas
A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMSâallowing attackers to execute arbitrary PHP code on unp...
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
28 Apr 2025
Contributed by Lukas
Recent research by HiddenLayer has uncovered a shocking new AI vulnerabilityâdubbed the "Policy Puppetry Attack"âthat can bypass safety guardrails...
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
25 Apr 2025
Contributed by Lukas
In this episode, we break down the most urgent cybersecurity developments from late April 2025âincluding the Lazarus Groupâs high-profile âOpera...
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
25 Apr 2025
Contributed by Lukas
In this episode, we dissect the real-world challenges of securing Microsoft 365 environmentsâespecially for small and medium-sized businessesâamid...
Why Outlook Is Eating Your CPU â And What Microsoft Says About It
25 Apr 2025
Contributed by Lukas
Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First a...
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
24 Apr 2025
Contributed by Lukas
A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked versi...
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
24 Apr 2025
Contributed by Lukas
Blue Shield of California has confirmed a data breach affecting 4.7 million membersâcaused not by hackers, but by a misconfigured Google Analytics s...
$16.6 Billion Lost: The True Cost of Cybercrime in America
24 Apr 2025
Contributed by Lukas
Cybercrime in the U.S. has reached new, record-breaking heights.In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3...
The Second Scam: FBI Warns of IC3 Impersonators Targeting Fraud Victims
22 Apr 2025
Contributed by Lukas
The FBI has issued a stark warning about a growing scam targeting individuals whoâve already been victimized. In this episode, we unpack how fraudst...
Inside the Breach: What Recent Cyberattacks Reveal About Your Data Security
16 Apr 2025
Contributed by Lukas
Cyberattacks are no longer rare shocksâthey're a constant drumbeat in the background of our digital lives. In this episode, we take you on a deep di...
Inside Security News : GitHub Supply Chain Attacks, Ransomware Defense, and Cloud Security
15 Apr 2025
Contributed by Lukas
In this deep-dive episode, we untangle some of todayâs most critical cybersecurity threatsâfrom GitHubâs complex quadruple supply chain attack t...
Next.js Security Vulnerability: Middleware Bypass (CVE-2025-29927)
14 Apr 2025
Contributed by Lukas
Is your web app truly secure? In this episode, we break down a critical NextJS vulnerability (CVE-2025-29927) that could allow attackers to bypass aut...
Cyberattack Roundup: Lessons from the Latest Breaches & Ransomware Strikes
26 Mar 2025
Contributed by Lukas
From data breaches at major banks to ransomware crippling healthcare and tech companies, cyber threats are hitting harder than ever. In this episode, ...
Mastering Incident Response: A Guide to Building a Resilient Plan
26 Mar 2025
Contributed by Lukas
Cyber threats are inevitable, but a strong incident response plan can make all the difference. In this episode, we explore the essential steps for cre...
No More Warnings? The Risks of Losing CIPACâs Cyber Threat Coordination
20 Mar 2025
Contributed by Lukas
The Department of Homeland Security (DHS) has abruptly shut down the Critical Infrastructure Partnership Advisory Council (CIPAC), the central hub for...
517,000 Victims: How a Ransomware Gang Targeted Pennsylvaniaâs Largest Educatorsâ Union
20 Mar 2025
Contributed by Lukas
Over 517,000 individuals are now at risk after the Pennsylvania State Education Association (PSEA) suffered a massive data breach in July 2024âclaim...
DollyWay: The 8-Year WordPress Malware Campaign Infecting 20,000 Sites
20 Mar 2025
Contributed by Lukas
For nearly a decade, a malware campaign dubbed DollyWay has silently compromised over 20,000 WordPress websites, evolving from a ransomware and bankin...
MegaRAC CVE-2024-54085 Vulnerability: Critical BMC Flaw Threatening Data Centers
19 Mar 2025
Contributed by Lukas
A newly discovered critical vulnerability (CVE-2024-54085) in AMIâs MegaRAC Baseboard Management Controller (BMC) software puts thousands of servers...
Microsoft Windows March Update Wipes Out Copilot
19 Mar 2025
Contributed by Lukas
Microsoftâs latest Windows 10 and 11 updates (KB5053598 and KB5053606) have accidentally uninstalled Copilot, the AI assistant, from some users' sys...
Hackers Flip the Script: How a Fake Coinbase Email Could Empty Your Wallet
18 Mar 2025
Contributed by Lukas
A new and incredibly deceptive phishing campaign is targeting Coinbase usersâbut this isnât your typical scam. Instead of stealing your recovery p...
Brute-Force on Autopilot: Black Bastaâs 'BRUTED' VPN Tool for Ransomware Expansion
17 Mar 2025
Contributed by Lukas
Black Basta, one of the most notorious ransomware gangs, has taken brute-force attacks to the next level with BRUTEDâan automated framework designed...
GitHub Action Hijacked: The Supply Chain Attack That Exposed 23,000 Repositories
17 Mar 2025
Contributed by Lukas
In this episode, we unpack a major supply chain attack that compromised the widely used GitHub Action âtj-actions/changed-filesâ, affecting over 2...
Brave Browser Review đŻ How Safe is This Web Browser? (2025)
17 Mar 2025
Contributed by Lukas
Bridging the Gap: Developers vs. Security in the Cloud
14 Mar 2025
Contributed by Lukas
In this episode of The Deep Dive, we explore the ongoing tension between development and security teams in cloud environments. While developers priori...
Exploring the Dark Web: Unveiling the Hidden Internet đđť
13 Mar 2025
Contributed by Lukas
Ever wondered what lies beneath the surface of the internet? đ¤ In this deep dive, we uncover the mysteries of the Dark Webâa hidden part of the i...
Security vulnerabilities: Key Steps for secure Workflows
12 Mar 2025
Contributed by Lukas
Ever wondered how sensitive credentialsâlike API keys, passwords, and certificatesâend up scattered across your systems? đ¤ This hidden cybersec...
The Hidden Threat of Wi-Fi Tracking: How Your Devices Reveal Your Location
12 Mar 2025
Contributed by Lukas
Did you know your phone is constantly mapping Wi-Fi hotspots around youâeven when you're not using GPS? In this deep dive, we uncover the unsettling...
Zero Trust & Data Security: The Future of Protecting Government Information
11 Mar 2025
Contributed by Lukas
In this episode, we dive into a crucial topicâdata security for government agencies. With evolving cyber threats, traditional security measures no l...
Japanese telco NTT Communications hacked hackers accessed details of almost 18,000 organizations
10 Mar 2025
Contributed by Lukas
panese telecommunications giant NTT Communications Corporation (NTT Com) has disclosed a data breach affecting information from nearly 18,000 corporat...
1 Million Devices Hit: Inside the Massive Malvertising Campaign
07 Mar 2025
Contributed by Lukas
A massive malvertising campaign has compromised one million devices worldwide, using malicious ads on illegal streaming websites to distribute malware...
Inside the $635K Taylor Swift Ticket Heist: Cybercrime, Loopholes, and Insider Threats
07 Mar 2025
Contributed by Lukas
A cybercrime operation involving the theft and resale of $635,000 worth of concert ticketsâprimarily for Taylor Swiftâs Eras Tourâhas been uncov...
Silk Typhoon Strikes: From Direct Breaches to Stealthy Supply Chain Attacks
06 Mar 2025
Contributed by Lukas
In this episode, we take an in-depth look at Silk Typhoon, the Chinese state-sponsored cyber espionage group thatâs radically shifting its tactics. ...
Tracking Stingrays: How Rayhunter Shields Your Mobile Privacy
06 Mar 2025
Contributed by Lukas
In this episode, we dive into Rayhunterâan open source tool from the EFF designed to detect Stingray devices (cell-site simulators) that compromise ...
AI-Generated Video of YouTube's CEO Used In Phishing Attack
05 Mar 2025
Contributed by Lukas
BackConnect, Microsoft Teams, & Social EngineeringâHow Ransomware is Adapting
05 Mar 2025
Contributed by Lukas
The ransomware landscape is shifting, and Black Basta and Cactus are at the center of it. In this episode, we break down the connections between these...
OnlyFans Cyberattacks: Fake CAPTCHAs and Malware Distribution Threaten Users
04 Mar 2025
Contributed by Lukas
Cyberattacks are increasingly targeting OnlyFans users through sophisticated phishing schemes. These attacks leverage fake Cloudflare CAPTCHAs to tric...
9 Million Downloads, Now Banned: VSCode Extensions Under Fire
27 Feb 2025
Contributed by Lukas
In a shocking move, Microsoft has banned the popular Material Theme â Free and Material Theme Icons â Free extensions from the Visual Studio Marke...