FBI: Scammers pose as FBI IC3 employees to ‘help’ recover lost funds
Summary: The FBI has issued a warning about scammers impersonating IC3 employees, attempting to defraud victims by offering help to recover lost funds. Reports of these schemes have increased significantly over the past two years, with scammers using various communication methods. Victims are advised to be cautious and not share personal information or money with individuals who contact them under these pretenses.…
Read More
Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
Summary: Researchers have identified an ongoing SMS phishing campaign targeting toll road users in the U.S., aimed at financial theft. The campaign, attributed to multiple threat actors using a specialized phishing kit from China, spreads fraudulent messages mimicking electronic toll systems. Victims are misled into providing personal information through fake payment portals after clicking embedded links in the messages.…
Read More
SonicWall SMA VPN devices targeted in attacks since January
Summary: A remote code execution vulnerability (CVE-2021-20035) affecting SonicWall Secure Mobile Access (SMA) appliances has been found to be actively exploited since January 2025, contrary to previous assessments that primarily deemed it a denial-of-service risk. SonicWall has updated its advisory to reflect the high severity of the flaw, as malicious actors can exploit it to execute arbitrary commands.…
Read More
Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
Phishing attacks, particularly through smishing (SMS phishing), are increasing in sophistication, manipulating recipients into clicking on malicious links by creating a sense of urgency. These tactics exploit human emotions and highlight the need for vigilance in recognizing such threats. Affected: businesses, individuals

Keypoints :

Phishing attacks are becoming more sophisticated and include SMS-based tactics known as smishing.…
Read More
The Model Context Protocol (MCP) is emerging as the new standard for integrating large language model (LLM) applications with external data sources and tools. While it offers significant capabilities, including natural language querying and contextual remediation, it also presents various security challenges that need to be managed through careful implementation and governance.…
Read More
Advanced macOS Spyware PasivRobber
A suspicious Mach-O file named *wsus* was discovered on VirusTotal, leading researchers to uncover a suite of more than 20 binaries designed to capture data from macOS systems, specifically targeting popular applications among Chinese users. The investigation suggested ties to a Chinese organization involved in surveillance and forensic tools, prompting concerns about the software’s legitimacy and cybersecurity risks.…
Read More
4Chan Outage Sparks Cyberattack Rumors and Data Leak Concerns
Summary: On April 14, 2025, 4Chan experienced significant downtime, leading to speculation about a potential cyberattack. User reports indicated that the outage was linked to server issues, and leaked backend data raised suspicions of a security breach. The incident has reignited concerns regarding 4Chan’s vulnerabilities and reputation amid a history of controversy and cyberattacks.…
Read More
North Korean Hackers Targeted Nearly 18,000 in Phishing Campaign During Martial Law Turmoil
Summary: North Korean hackers launched a phishing campaign targeting around 18,000 individuals, sending over 120,000 emails that impersonated South Korea’s Military Counterintelligence Command amidst Martial Law turmoil. The operation utilized automated methods and recycled infrastructure, successfully compromising at least 570 recipients’ sensitive information. The South Korean authorities have issued warnings to the public to remain vigilant against such phishing threats.…
Read More
AI-Driven Human Hacking is a New Frontier in Cybersecurity
Summary: The article by Associate Professor Dr. Sheeba Armoogum discusses the transformative impact of artificial intelligence on human hacking, highlighting how it enables more sophisticated and scalable manipulation of individuals compared to traditional social engineering tactics. It also addresses the ethical implications of AI-driven attacks and the urgent need for evolved cybersecurity measures to combat these threats effectively.…
Read More
LLMs Create a New Supply Chain Threat: Code Package Hallucinations
Summary: Code-generating large language models (LLMs) are introducing a significant security threat known as code package hallucinations, where LLMs generate references to non-existent packages. This issue can be exploited by malicious actors to create harmful repositories, potentially compromising software supply chains. Recent research shows that hallucinations can occur over 20% of the time, underscoring the urgency for detection and mitigation strategies.…
Read More
The Code to Survival: Taiwan’s Cybersecurity Pivot Explained
Summary: Taiwan is set to launch a new cybersecurity center in August to combat increasing cyber threats, particularly from the Chinese state. The center aims to adopt a comprehensive approach to cyber defense, focusing on societal resilience, critical infrastructure protection, and AI security. This initiative reflects Taiwan’s shift from fragmented defenses to a coordinated national strategy amid escalating geopolitical tensions.…
Read More
What the State of Pentesting Report 2025 Reveals About Cybersecurity Readiness
Summary: The State of Pentesting Report 2025 reveals significant gaps in cybersecurity, particularly in vulnerability management and the swift integration of generative AI without adequate security measures. Despite 81% of organizations claiming robust cybersecurity postures, actual remediation rates of vulnerabilities remain alarmingly low. The report emphasizes the urgent need for programmatic pentesting to effectively manage risks and protect against emerging threats.…
Read More