
RedKitten Campaign Targets NGOs Amid Iranian Unrest
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during

A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during

Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand

Cyber attackers leverage the CVE-2025-8088 high-severity WinRAR vulnerability. This security loophole is targeted for initial access and malware delivery, affecting

Nebraska federal authorities charge 31 more individuals linked to a Venezuelan crime syndicate for their part in a widespread ATM

ShinyHunters are deploying voice phishing to breach SSO accounts and access corporate data in platforms like Okta, Microsoft, and Google.

The North Korean APT group known as Konni has refined its strategies by employing AI-driven malware to specifically target developers

The Contagious Interview cyber campaign targets multiple sectors worldwide, impacting IP addresses and organizations in AI, finance, and other industries.

U.K. authorities caution against Russian-aligned hacktivists launching disruptive DDoS attacks. The focus is on critical infrastructure and local government services.

The cyber threat actor UAT-8837, associated with China, targets North American critical infrastructure through the exploitation of known and zero-day

Microsoft and law enforcement have disrupted the RedVDS cybercrime operation, which facilitated phishing and other malicious activities. This operation involves
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.