What’s Trending: Top Cyber Attacker Techniques, December 2024–February 2025
ReliaQuest’s report analyzed incidents from December 2024 to February 2025, revealing a surge in attacks by financially motivated actors targeting vulnerabilities in external remote services and internal phishing tactics. Key findings include increased VPN brute-forcing, MSHTA command abuses, and advancements in malware. Recommendations for improved cyber defenses include enabling specific detection rules and enhancing employee training against phishing.…
Read More

Victim: Galvatech Country : Actor: qilin Source: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=18c49dd6-7d8c-3fa3-af4b-bc304f205e89 Discovered: 2025-04-09 17:09:57.971969 Published: 2025-04-09 00:00:00.000000 Description : Galvatech, a family-owned business based in Sydney Central West, has been a vital player in the steel industry for 40 years, specializing in hot dip galvanizing services compliant with the AS/NZS 4680:2006 standard.…
Read More

Victim: Consonic Country : Actor: akira Source: Discovered: 2025-04-09 14:47:31.854828 Published: 2025-04-09 00:00:00.000000 Description : Consonic, a well-established engineering solutions provider with a proud 50-year history serving the Australian and New Zealand automotive, plastic processing, packaging, food processing, and medical industries, has fallen victim to a ransomware attack by the cybercriminal group Akira.…
Read More
VibeScamming — From Prompt to Phish: Benchmarking Popular AI Agents’ Resistance to the Dark Side
This article discusses the dangers posed by generative AI in facilitating phishing scams, highlighting the results of the VibeScamming Benchmark v1.0. Guardio Labs evaluated how well popular AI platforms handle scam-related prompts, revealing significant vulnerabilities across different models. The findings urge AI developers to prioritize safety measures in their technologies to protect individuals from fraud.…
Read More
Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots
Summary: GitGuardian’s 2025 State of Secrets Sprawl report highlights the critical issue of secrets exposure in software environments, revealing a staggering increase in leaked secrets driven by the prevalence of non-human identities (NHIs). The report underscores the security challenges posed by mismanaged machine credentials and the misconception of safety in private repositories.…
Read More
The US Treasury’s OCC disclosed an undetected major email breach for over a year
Summary: The US Treasury’s Office of the Comptroller of the Currency (OCC) experienced a significant email breach lasting over a year, involving unauthorized access to sensitive financial information through a compromised administrative account. The breach was confirmed on February 12, 2025, and has triggered a thorough review and analysis of impacted accounts.…
Read More
Cyberattack Disrupts Arizona Federal Public Defender’s Office, Delays Mental Competency Hearing for Death Row Inmate Ralph Menzies

Date Reported: 2025-04-02 Country: USA | United States of America Victim: Ralph Menzies | Ralph Menzies Website: az.fd.org Information :A ransomware cyberattack targeted the Federal Public Defender’s office in Arizona. The attack resulted in the loss of access to case files related to Ralph Menzies, who is on death row.…
Read More

Summary: The video discusses the fascinating journey of Jonathan Jacobi, a 24-year-old cybersecurity expert, who started his career at a young age. He shares his experiences from being a passionate computer science enthusiast to achieving significant milestones as a CTF player and vulnerability researcher. Jonathan reflects on the importance of technical skills and human connections in navigating his career path, emphasizing that both aspects are essential for success.…
Read More
Microsoft fixes auth issues on Windows Server, Windows 11 24H2
Summary: Microsoft has resolved authentication issues linked to Credential Guard when using the Kerberos PKINIT protocol, primarily affecting Windows 11 (version 24H2) and Windows Server 2025. Users experienced problems with password rotation, which led to user authentication difficulties on some enterprise systems. These issues are predominantly found in enterprise environments, leaving home devices largely unaffected.…
Read More

Summary: The video discusses Anthropic’s recent announcement regarding Claude, an AI tool designed specifically for education. Unlike traditional AI, Claude’s learning mode focuses on guiding students to develop critical thinking skills through Socratic questioning rather than just providing answers. The implementation of Claude in educational settings includes partnerships with universities, and the speaker shares personal insights on using AI responsibly for learning without undermining students’ education.…
Read More

Victim: crystal-d.com Country : DE Actor: lockbit3 Source: http://lockbit3olp7oetlc4tl5zydnoluphh7fvdt5oa6arcp2757r7xkutid.onion/post/vNRV0CPBAQxee8Uu67f50b8c1ace6 Discovered: 2025-04-08 13:12:22.527635 Published: 2025-04-08 11:42:00.000000 Description : Crystal D, a company based in Germany with over 20 years of experience in manufacturing corporate gifts, recognition awards, and crystal promotional products, recently fell victim to a ransomware attack attributed to the LockBit3 group.…
Read More
Agentic AI in the SOC – Dawn of Autonomous Alert Triage
Summary: This article explores the transformative power of Agentic AI in Security Operations Centers (SOCs), emphasizing its autonomy compared to traditional Assistant AI tools. It highlights how Agentic AI automates critical triage and investigation tasks, reducing analyst fatigue while improving operational efficiency and cost-effectiveness. The article also offers key considerations for evaluating Agentic AI solutions to enhance security operations.…
Read More
CISA Warns of CrushFTP Exploit Letting Attackers Bypass Authentication
Summary: The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability (CVE-2025-31161) affecting CrushFTP, a widely utilized FTP server software. This Authentication Bypass Vulnerability enables attackers to bypass authentication processes, take over administrative accounts, and potentially compromise sensitive data. Users are urged to update to secure versions to mitigate this serious risk.…
Read More