Cybercriminals Weaponize Google Cloud’s Application Integration in Multi-Stage Phishing

Cybercriminals are actively exploiting Google Cloud’s Application Integration service to launch multi-stage phishing campaigns, impersonating legitimate Google-generated messages to deceive recipients. Cybersecurity researchers, including those …

Read more

Cyber Deception: ShinyHunters Claims Resecurity Breach, Firm Cries Honeypot

The notorious ShinyHunters hacking collective recently alleged a successful breach of cybersecurity firm Resecurity’s internal systems, claiming to have exfiltrated a significant volume of proprietary …

Read more

Delayed Impact: LastPass Breach Fuels Ongoing Cryptocurrency Thefts

Blockchain investigation firm TRM Labs has definitively linked a series of ongoing cryptocurrency theft attacks to the 2022 LastPass data breach, revealing that sophisticated attackers …

Read more

React2Shell Vulnerabilities: Critical Infrastructure Under Immediate Threat from Rapid Exploitation

Threat actors are swiftly leveraging newly disclosed React2Shell (RSC) vulnerabilities, integrating them into scanning and reconnaissance routines to target critical infrastructure globally, specifically sectors involved …

Read more

Transparent Tribe Unleashes New RAT Campaign Against Indian Strategic Sectors

Transparent Tribe, a persistent and sophisticated threat actor, has launched a renewed wave of remote access trojan (RAT) attacks targeting critical Indian governmental, academic, and …

Read more

RondoDox Botnet Exploits Critical React2Shell Flaw, Hijacking IoT Devices and Web Servers

A sophisticated nine-month-long cyber campaign, spearheaded by the RondoDox botnet, has been actively exploiting the recently disclosed React2Shell vulnerability (CVE-2025-55182) to compromise a wide array …

Read more