Trending

Critical Infrastructure Attacks Became Routine for Hacktivists in 2025

2025 may be remembered as the year that hacktivist attacks became significantly more dangerous.

Ransomware and Supply Chain Attacks Soared in 2025

The threat landscape shifted significantly in 2025. Here are the threats and trends to watch as we enter 2026.

deVixor: An Evolving Android Banking RAT with Ransomware Capabilities Targeting Iran

Cyble analyzed deVixor, an advanced Android banking RAT with ransomware features actively targeting Iranian users.

The Week in Vulnerabilities: 2026 Starts with 100 PoCs and New Exploits 

The year may be a little more than a week old, but threat actors have already amassed nearly 100 Proof of Concepts and newly exploited vulnerabilities.

Initial Access Sales Accelerated Across Australia and New Zealand in 2025

Cyble’s 2025 report analyzes Initial Access sales, ransomware operations, and data breaches shaping the cyber threat landscape in Australia and New Zealand.

Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915) 

A critical authentication bypass flaw, CVE-2025-13915, affects IBM API Connect. Singapore issues alert as IBM releases fixes.

CISA Known Exploited Vulnerabilities Surged 20% in 2025 

CISA’s Known Exploited Vulnerabilities (KEV) catalog grew by 20% in 2025, including 24 vulnerabilities exploited by ransomware groups.

The Week in Vulnerabilities: The Year Ends with an Alarming New Trend 

New vulnerabilities have grown at twice their long-term rate in recent weeks, increasing pressure on security teams to patch quickly.

RTO Scam Wave Continues: A Surge in Browser-Based e-Challan Phishing and Shared Fraud Infrastructure

CRIL Uncovers a New Wave of Browser-Based e-Challan Phishing Powered by Shared Fraud Infrastructure.
Scroll to Top