Cybersecurity

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader 

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader 

Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver post-exploitation tools like Cobalt Strike and AdaptixC2, and a remote access trojan known as PureHVNC RAT.
“CountLoader is being used either as part of an Initial Access Broker’s (IAB) toolset or by a ransomware affiliate with ties to the LockBit,

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers 

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers 

Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to deliver a remote access trojan called SilentSync on Windows systems.
“SilentSync is capable of remote command execution, file exfiltration, and screen capturing,” Zscaler ThreatLabz’s Manisha Ramcharan Prajapati and Satyam Singh said. “SilentSync also extracts

How CISOs Can Drive Effective AI Governance 

How CISOs Can Drive Effective AI Governance 

AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI governance. When it comes to any emerging technology, governance is hard – but effective governance is even harder. The first instinct for most organizations is to respond with rigid policies. Write a policy document, circulate a set of restrictions, and

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions 

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions 

Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been exploited in the wild.
The zero-day vulnerability in question is CVE-2025-10585, which has been described as a type confusion issue in the V8 JavaScript and WebAssembly engine.
Type confusion vulnerabilities can have severe consequences as they can be

Smashing Security podcast #435: Lights! Camera! Hacktion! 

Smashing Security podcast #435: Lights! Camera! Hacktion! 

When “bad actors” stop being hackers and start being… actual actors.

This week, Graham and special guest Jenny Radcliffe play “Hacker or Ham?” (yes, Steven Seagal, we’re looking at you), before diving into a campaign which saw an Iranian gang luring Israeli performers with fake casting calls for a serious film.

We unpack why positive lurescan short-circuit scepticism just as effectively as fear.

Plus, the UK’s ICO says students are increasingly hacking their own schools.

Meanwhile, Graham heads to 1960s Oxford with Endeavour, while Jenny investigates the Wirral’s mysterious “Catman”.

All this, and more, in episode 435 of the “Smashing Security” podcast.

TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks 

TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks 

The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to breach hotels in Brazil and Spanish-speaking markets.
Russian cybersecurity vendor Kaspersky is tracking the activity, observed in summer 2025, to a cluster it tracks as RevengeHotels.
“The threat actors continue to employ phishing emails with invoice

Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts 

Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts 

A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures.
“In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party (CCP), as well as the

From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience 

From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience 

Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking up to news that hackers have used a quantum computer to crack your company’s encryption overnight, exposing your most sensitive data, rendering much of it untrustworthy.
And with your

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X