Operation SyncHole: Lazarus APT targets supply chains in South Korea

The campaign has been active since at least November 2024, Lazarus Group is targeting South Korean organizations using watering hole tactics and exploiting software vulnerabilities.

Chrome Extension Uses AI Engine to Act Without User Input

Security researchers from ExtensionTotal have discovered a Chrome extension capable of interacting with local Model Context Protocol (MCP) servers without user permission or detection by Chrome’s security mechanisms.

EM-FI Glitching Attacks Bypass Firmware Protection on GigaDevice GD32F407

Security researchers have demonstrated the successful use of two distinct electromagnetic fault injection (EM-FI) glitching attacks to bypass the hardware-based firmware readout protection of the GigaDevice GD32F407 microcontroller.

Precision-Validated Phishing: A New Threat to Defenders​

A new phishing tactic known as Precision-Validated Phishing is being leveraged by cybercriminals to enhance the effectiveness of credential theft campaigns. This technique uses real-time email validation.

Streaming Services: A New Front for Cybersecurity Threats

A recent phishing campaign has been uncovered targeting Spotify users through a spoofed email that mimics official Spotify communications. The attackers embedded legitimate Spotify URLs within the email to lend credibility.

HR-Themed Phishing Exploits Q1 Evaluations: Stay Alert

A recent phishing campaign exploits the timing of Q1 evaluations by impersonating internal HR communications to deceive employees. The campaign culminates in credential theft via a spoofed Microsoft login page.

Double-Edged Email Attacks: Phishing & Malware Tactics​

A recent phishing campaign leverages a dual-threat strategy combining credential harvesting and malware delivery. Disguised as a file deletion alert, the attack exploits user trust to deploy the ConnectWise RAT or steal Office365 credentials.

Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments

A new proof-of-concept attack dubbed Cookie-Bite demonstrates how a malicious Chrome extension can steal Azure Entra ID session cookies to bypass multi-factor authentication (MFA) and maintain unauthorized access to Microsoft cloud services.

SheByte PaaS Launches Subscription Service for Cybercriminals

Launched in June 2024, SheByte has rapidly gained traction among cybercriminals by offering customizable phishing kits and a subscription model, signaling a durable presence in the threat landscape.

Billbug: Intrusion Campaign Against Southeast Asia Continues

A newly uncovered espionage campaign by the Billbug group (aka Lotus Blossom, Lotus Panda, Bronze Elgin) targeted multiple Southeast Asian organizations between August 2024 and February 2025.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags