New Anubis Ransomware Update Brings File-Wiping Danger

A new and dangerous update has been found in the Anubis ransomware, making it even more harmful than before. Anubis first appeared in late 2024 and has been growing ever since. Now, it has added a feature called “WIPEMODE” that allows it to permanently delete files from a victim’s computer. This means that even if … Continued

WhatsApp Finally Rolls Out Ads After 6-Year Wait

After a long six-year wait, Meta has finally started showing ads on WhatsApp. The plan to introduce ads was first revealed back in 2018, but the actual rollout began on June 16, 2025. This marks a major shift for WhatsApp, which had always been known for being private and ad-free. The new ads won’t pop … Continued

Iranian Hackers Launch Big Cyber Attack on Israel After Airstrikes

Over the past few days, Israel has been hit by a major wave of cyberattacks, and reports say Iranian-linked hackers are behind them. These attacks started soon after Israel launched airstrikes on Iranian military and nuclear targets on June 13. According to cybersecurity experts at Radware, the number of cyberattacks targeting Israel has jumped by … Continued

WestJet Under Attack: Hackers Disrupt App and Dig Into Systems

Canada’s second-largest airline, WestJet, is currently investigating a cybersecurity incident that disrupted its mobile app and some internal systems. The issue came to light on June 13, 2025, and is now being handled by WestJet’s internal teams, in coordination with law enforcement and government agencies.   According to WestJet, the attack specifically targeted systems connected … Continued

Malicious PyPI Package Targets macOS Devs with Hidden Malware

A dangerous Python package was recently found on the official Python Package Index (PyPI). It was named chimera-sandbox-extensions and disguised itself as a helpful tool for Chimera Sandbox, a legitimate open-source project used by developers to run AI experiments, especially on macOS. But in reality, this package was malware designed to steal sensitive information from … Continued

Ransomware Gang Uses SimpleHelp to Hack Utility Billing Firm

A ransomware group has targeted a utility billing software provider by taking advantage of a serious vulnerability in a remote monitoring tool called SimpleHelp. This tool is widely used by managed service providers (MSPs) and IT support teams to access systems remotely. Unfortunately, attackers have found a way to abuse it to launch ransomware attacks. … Continued

Proofpoint Just Got Stronger: Two Smart Buys to Boost Cybersecurity

Cybersecurity company Proofpoint has made two major acquisition announcements that are set to strengthen its position in cloud security and compliance. These moves, made in May 2025, are seen as strategic steps to better protect users across modern collaboration platforms, especially Microsoft 365. The first big move by Proofpoint is the acquisition of Hornetsecurity, a … Continued

Spyware Used Apple Messages Bug to Secretly Spy on Journalists

A serious security issue has been found in Apple’s Messages app. This problem was used to spy on journalists in Europe using a spyware tool called Graphite, made by a company named Paragon. The attack was discovered by researchers at Citizen Lab, who found clear signs that two journalists were targeted using this flaw. The … Continued

NIST Publishes New Zero Trust Implementation Guidance

NIST has just released a practical new guide called SP 1800-35: Implementing a Zero Trust Architecture. Developed by the National Cybersecurity Center of Excellence (NCCoE) along with 24 private-sector collaborators, this document goes beyond theory. It gives real, working examples of how organizations can implement zero trust security using tools that are already available on … Continued

New Fog Ransomware Uses Common Software to Launch Stealthy Attack

A new ransomware strain named Fog recently targeted a financial institution in Asia. What makes this attack different is the way the attackers used a mix of open-source hacking tools and legitimate software to carry out their plan. This helped them stay unnoticed and cause serious damage. The attackers managed to get into the system … Continued

Newsletter line