Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

    Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

    August 29, 2025
    Cyber News

    Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked APT29 actors as part of their intelligence gathering efforts. The campaign used “compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft’s device code ​ ​…

  • TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies

    TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies

    August 29, 2025
    Cyber News

    Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites to deliver a new information stealer called TamperedChef. “The objective is to lure victims into downloading and installing a trojanized PDF editor, which includes an information-stealing malware dubbed TamperedChef,” Truesec researchers Mattias Wåhlén, Nicklas ​ ​ ​Read More

  • CISA, FBI, NSA Warn of Chinese ‘Global Espionage System’

    CISA, FBI, NSA Warn of Chinese ‘Global Espionage System’

    August 28, 2025
    Cyber News

    Three federal agencies were parties to a global security advisory this week warning about the extensive threat posed by Chinese nation-state actors targeting network devices. ​ ​ ​Read More

  • Hackers Steal 4M+ TransUnion Customers’ Data

    Hackers Steal 4M+ TransUnion Customers’ Data

    August 28, 2025
    Cyber News

    The credit reporting agency said the breach was “limited to specific data elements” and didn’t include credit reports or core credit information. ​ ​ ​Read More

  • Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups

    Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups

    August 28, 2025
    Cyber News

    Many familiar faces made Flashpoint’s 2025 midyear ransomware report, as well as new gangs, which are increasingly using AI. ​ ​ ​Read More

  • 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer

    1,000+ Devs Lose Their Secrets to an AI-Powered Stealer

    August 28, 2025
    Cyber News

    One of the most sophisticated supply chain attacks to date caused immense amounts of data to leak to the Web in a matter of hours. ​ ​ ​Read More

  • Anthropic AI Used to Automate Data Extortion Campaign

    Anthropic AI Used to Automate Data Extortion Campaign

    August 27, 2025
    Cyber News

    The company said the threat actor abused its Claude Code service to “an unprecedented degree,” automating reconnaissance, intrusions, and credential harvesting. ​ ​ ​Read More

  • ‘ZipLine’ Phishers Flip Script as Victims Email First

    ‘ZipLine’ Phishers Flip Script as Victims Email First

    August 27, 2025
    Cyber News

    “ZipLine” appears to be a sophisticated and carefully planned campaign that has already affected dozens of small, medium, and large organizations across multiple industry sectors. ​ ​ ​Read More

  • Nevada’s State Agencies Shutter in Wake of Cyberattack

    Nevada’s State Agencies Shutter in Wake of Cyberattack

    August 27, 2025
    Cyber News

    In response to a cyberattack that was first detected on Sunday, the governor shut down in-person services for state offices while restoration efforts are underway. ​ ​ ​Read More

  • China Hijacks Captive Portals to Spy on Asian Diplomats

    China Hijacks Captive Portals to Spy on Asian Diplomats

    August 27, 2025
    Cyber News

    The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites. ​ ​ ​Read More

Previous Page
1 … 24 25 26 27 28
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn