Latest Cybersecurity News and Articles

DDoS attacks serve as instruments of political influence and disruption

In H1 2025, a total of 8,062,971 DDoS attacks were recorded globally, with the EMEA region experiencing the highest volume at 3.2 million attacks. Peak attack speeds reached 3.12 Tbps and 1.5 Gbps.

Cloudflare Mitigates Largest Ever Recorded DDoS Attack at 11.5 Tbps

A record-breaking Distributed Denial-of-Service (DDoS) attack peaking at 11.5 terabits per second (Tbps) was successfully mitigated without service disruption. The attack lasted approximately 35 seconds.

South Carolina school district notifies 31,000 people of data breach that leaked SSNs and financial info

School District 5 of Lexington and Richland Counties, South Carolina, experienced a ransomware attack in June 2025, compromising sensitive data of 31,475 individuals. The Interlock ransomware gang claimed responsibility.

SaaS giant Workiva discloses data breach after Salesforce attack

A recent data breach at a major SaaS provider has exposed sensitive customer information following a compromise of a third-party CRM system. The breach is part of a broader campaign targeting Salesforce customers.

Android security advisory – September 2025 monthly rollup (AV25-560)

A security bulletin was published on September 2, 2025, addressing two critical vulnerabilities in Android—CVE-2025-38352 and CVE-2025-48543. Both vulnerabilities are confirmed to be under limited, targeted exploitation.

Mis-issued certificates for 1.1.1.1 DNS service pose a threat to the Internet

Three TLS certificates were mis-issued for 1.1.1.1, a DNS service operated by Cloudflare and APNIC. These certificates, issued in May 2025 by Fina RDC 2020, a subordinate CA under Fina Root CA, were only discovered four months later.

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

A new variant of infostealer malware, Stealerium, introduces an automated sextortion feature that captures webcam images and browser screenshots when victims access NSFW content. This development marks a disturbing evolution in cybercrime.

Threat actors abuse X’s Grok AI to spread malicious links

Threat actors are exploiting X’s built-in AI assistant, Grok, to distribute malicious links by bypassing the platform’s link-posting restrictions. This abuse leverages Grok’s trusted status to amplify the reach and credibility of harmful content.

Android droppers evolved into versatile tools to spread malware

ThreatFabric researchers have identified a new dropper variant named RewardDropMiner. This staged dropper is capable of evading both Play Protect and the Pilot Program by delaying malicious activity until after installation.

Fake AnyDesk Installer Spreads MetaStealer Through ClickFix Scam

A new malware campaign is leveraging a fake AnyDesk installer and a deceptive ClickFix technique to distribute MetaStealer malware. This campaign uses a novel "FileFix" method to bypass traditional defenses by exploiting Windows File Explorer.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags