THREATS

This section has all the newest information on a wide range of threats, such as online threats, physical security risks, and new threats. Keep up with the latest changes in attacks, weaknesses, and possible dangers in a variety of areas. Our coverage gives you an idea of how these threats are changing and what you can do to lessen their effects.

Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking ToolsRussian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools

Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools

Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated adversary targeting critical sectors worldwide.…

11 hours ago
North Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company NetworksNorth Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company Networks

North Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company Networks

North Korean IT workers have intensified their global operations, expanding their employment footprint across Europe to infiltrate corporate networks and…

2 days ago
Russian Hackers Leverage Bulletproof Hosting to Shift Network InfrastructureRussian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting entities worldwide with a focus…

3 days ago
Threat Actors Embed Malware in WordPress Sites to Enable Remote Code ExecutionThreat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution

Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution

Security researchers have uncovered a new wave of cyberattacks targeting WordPress websites through the exploitation of the "mu-plugins" (Must-Use plugins)…

3 days ago
Gamaredon Hackers Weaponize LNK Files to Deliver Remcos BackdoorGamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting Ukrainian users with malicious LNK…

5 days ago
Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence DataRussian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have launched a multi-pronged phishing campaign impersonating…

6 days ago
Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling PlatformsThreat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to redirect visitors to Chinese-language gambling platforms.…

1 week ago
Threat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System AccessThreat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System Access

Threat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System Access

A sophisticated phishing campaign targeting the hospitality industry has been uncovered, with threat actors impersonating Booking.com to gain access to…

1 week ago
Lucid PhAAS Platform Uses RCS and iMessage to Evade DetectionLucid PhAAS Platform Uses RCS and iMessage to Evade Detection

Lucid PhAAS Platform Uses RCS and iMessage to Evade Detection

The cybersecurity landscape has been disrupted by the emergence of Lucid, a sophisticated Phishing-as-a-Service (PhAAS) platform developed by Chinese-speaking threat…

1 week ago
Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing AttacksThreat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate…

1 week ago