
Month: August 2025
-
Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025)
**Executive Summary**———————This article lists selected threat actors tracked by Palo Alto Networks Unit 42, using our specific designators for these…
-
Why the tech industry needs to stand firm on preserving end-to-end encryption
PrivacyWhy the tech industry needs to stand firm on preserving end-to-end encryption=============================================================================Restricting end-to-end encryption on a single-country basis would not…
-
Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)
VideoIs your phone spying on you? -| Unlocked 403 cybersecurity podcast (S2E5)=========================================================================Here’s what you need to know about the inner…
-
DARPA prepares to assess top teams in DEF CON AI-cyber competition
DARPA prepares to assess top teams in DEF CON AI-cyber competition================================================================== Justin Sullivan / Staff / Getty Images | Get…
-
New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
A sophisticated Linux backdoor dubbed Plague has emerged as an unprecedented threat to enterprise security, evading detection across all major…
-
SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
A suspected zero-day vulnerability in SonicWall firewall devices that the [Akira ransomware](https://cybersecuritynews.com/tag/akira-ransomware/) group is actively exploiting. The flaw allows attackers…
-
SafePay Ransomware Infected 260+ Victims Across Multiple Countries
A new ransomware threat has emerged as one of the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming…
-
Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
A sophisticated cyber espionage campaign targeting software developers has infiltrated two of the world’s largest open source package repositories, with…
-
LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One
LockBit ransomware operators have adopted an increasingly sophisticated approach to evade detection by leveraging DLL sideloading techniques that exploit the…
-
Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS
The ransomware landscape experienced a significant shift in the second quarter of 2025 as Qilin ransomware emerged as the dominant…

