Ukrainian Systems Hit as Russia-Backed APT28 Uses Signal to Bypass Defenses

A well known Russian hacking group named APT28, also known as Fancy Bear, has started using Signal, a private messaging app, to deliver malware to Ukrainian government systems. This method is unusual because Signal is considered one of the most secure apps in the world. It’s mostly used by journalists, government officials, and cybersecurity professionals … Continued

Two Major Vulnerabilities in Amazon EKS Can Lead to AWS Credential Theft

Security researchers have discovered two critical vulnerabilities in Amazon Elastic Kubernetes Service (EKS) that could allow attackers to access AWS credentials and escalate privileges. These flaws come from how container permissions are configured in certain scenarios and show how small misconfigurations can lead to serious security risks. Amazon EKS is a managed service by AWS … Continued

Cyberattack hits Nucor as hackers steal company data

Recently, the largest steel producer in the United States, Nucor Corporation, confirmed that it was hit by a cyberattack where hackers stole company data. This incident forced the company to shut down some of its systems and also led to temporary production delays at multiple locations. The attack was made public in a document filed … Continued

Top 10 SaaS Platforms Powering Businesses in 2025

SaaS platforms have become the backbone of modern business. They help teams work faster, save money, and stay connected no matter where they are. With everything stored and managed in the cloud, there’s no need for complex setups or high upfront costs. Whether it’s handling customer data, running marketing campaigns, or managing projects, SaaS tools … Continued

Massive DDoS Attack Hits 7.3 Tbps and Sends 37.4 TB of Data in 45 Seconds

A major cyberattack has recently set a new global record, and it’s one that security experts won’t forget any time soon. A powerful Distributed Denial-of-Service (DDoS) attack targeted a hosting provider, reaching a peak speed of 7.3 terabits per second and transferring over 37 terabytes of data in under a minute. Thankfully, the targeted company … Continued

Malicious Code Hidden in 200+ GitHub Repositories Targets Gamers and Developers

In a recent discovery, security researchers have found more than 200 malicious repositories on GitHub that were part of a large-scale campaign targeting gamers and developers. These projects appeared to be normal open-source tools like game cheats, Telegram bots, or social media utilities. But behind the scenes, they were designed to deliver malware to anyone … Continued

Godfather Android Malware Gets Smarter – Runs Real Banking Apps Virtually

A dangerous new version of the “Godfather” Android malware has been discovered, and this time it’s using a much more advanced method to hack into banking apps. Instead of showing fake login screens like before, this updated malware now runs real banking apps in a virtual environment on your phone, stealing everything you type without … Continued

Gmail Security Bypassed: Russian Group Uses App Passwords to Hack Accounts

A Russian government-backed hacking group known as APT29, or Cozy Bear, has launched a clever phishing campaign targeting Gmail users. What’s worrying is how they bypassed Google’s two-factor authentication (2FA) without needing to steal passwords directly. Instead, they tricked users into creating something called an app password, which lets hackers access the account without needing … Continued

$90 Million in Crypto Burned: Pro-Israel Hackers Hit Iran’s Nobitex

A major cyberattack has hit Iran’s largest cryptocurrency exchange, Nobitex, resulting in the destruction of around $90 million worth of crypto assets. This wasn’t a theft, it was a deliberate burn. The group behind the attack is called Predatory Sparrow, also known by its Farsi name Gonjeshke Darande. They are believed to be linked to … Continued

North Korean Hackers Trick Users with Deepfake Zoom Calls to Install Malware

A North Korean hacker group known as BlueNoroff has pulled off a new kind of cyberattack that blends social engineering, deepfake technology, and malware to target Mac users. This group, already linked to several cryptocurrency-related attacks in the past, has now used fake Zoom calls and artificial intelligence-generated videos to trick their victims into downloading … Continued

Newsletter line