Cybersecurity

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar 

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar 

The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale.
Push Security, in a report shared with The Hacker News, said it observed the use

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year 

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year 

Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol.
The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and

The AI Fix #77: Genome LLM makes a super-virus, and should AI decide if you live? 

The AI Fix #77: Genome LLM makes a super-virus, and should AI decide if you live? 

In episode 77 of The AI Fix, a language model trained on genomes that creates a super-virus, Graham wonders whether AI should be allowed to decide if we live or die, and a woman marries ChatGPT (and calls it “Klaus”).

Also in this episode: In Russia a robot staggers, falls over, and breaks; MIT quietly withdraws a ludicrously bad cybersecurity paper; the founder of a $1 billion AI company reveals his first AI was just two dudes on a Zoom call, and a futurologist reveals eight things we’ll be doing with humanoid robots by 2040.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion 

Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion 

Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni.
“The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,”

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks 

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks 

Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East.
The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first documented by the threat

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale 

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale 

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead.
But as your cloud setup grows, it gets harder to control who can access what.
Even one small mistake—like the wrong person getting access—can lead to big problems. We’re talking data leaks, legal trouble, and serious

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities 

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities 

Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane.
Building on Gartner’s definition of “identity

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages 

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages 

Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites.
The malicious npm packages, published by a threat actor named “dino_reborn” between September and November 2025, are

A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research 

A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research 

One of the sad truths about this world of seemingly endless hacks and data breaches is that companies just won’t apologise.

Even when customers, partners, and employees are left wondering when their data will be published by malicious hackers on the dark web, breached organisations will seemingly do everything they can to avoid saying what seems to be the hardest word of all: sorry.

Read more in my article on the Hot for Security blog.

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet 

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet 

Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 5.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps).
The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated from a TurboMirai-class Internet of

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X