Qualys and Tenable new victims of salesloft drift
News & Updates

Qualys and Tenable Join Growing List of Victims in Salesloft Drift Supply Chain Attack

In a stark reminder of the fragility of third-party integrations, cybersecurity heavyweights Qualys and Tenable have become the latest casualties in a sprawling supply chain attack dubbed SalesDrift. This breach, which exploits stolen OAuth tokens to access Salesforce data, has rippled through dozens of high-profile firms, exposing customer information and underscoring the hidden risks in […]

Security Defense macOS Malware
News & Updates

macOS Malware Campaign Uses Cracked Apps to Bypass Apple’s Security Defense

A sophisticated malware campaign is targeting macOS users by disguising the Atomic macOS Stealer (AMOS) as cracked versions of popular software, exploiting Apple’s latest security measures. As uncovered by Trend Micro and reported on [techguideonline.com], this attack showcases cybercriminals’ adaptability in evading macOS Sequoia’s enhanced Gatekeeper protections. With sensitive data like credentials and cryptocurrency wallets

School District Data Breach
News & Updates

South Carolina School District Data Breach Impacts Over 31,000 Individuals

A significant data breach at School District Five of Lexington & Richland Counties in South Carolina has potentially exposed the personal information of 31,475 individuals, highlighting vulnerabilities in educational institutions’ cybersecurity. As reported on [techguideonline.com], the incident, which occurred in June 2025, disrupted operations and underscores the growing threat of ransomware attacks targeting schools. With

USA Congress
News & Updates

Fintechs Push for Federal Privacy Law to Override State Regulations

Financial technology companies are urging Congress to streamline data privacy regulations by amending the Gramm-Leach-Bliley Act (GLBA) to preempt state privacy laws. As reported on [techguideonline.com], this effort aims to create a unified federal standard, reducing the complexity of navigating diverse state rules. With data privacy becoming a critical concern, this push could reshape how

ICE reinstates contract with spyware maker Paragon
News & Updates

ICE Reinstates Controversial Spyware Contract with Paragon Amid Global Scrutiny in 2025

As digital surveillance tools blur the lines between national security and personal privacy, a recent move by US Immigration and Customs Enforcement (ICE) has reignited debates over government use of advanced spyware. Independent journalist Jack Poulson revealed that ICE has lifted a suspension on a multimillion-dollar deal with Paragon Solutions, an Israeli spyware firm now

Package NPM drain crypto wallets
News & Updates

Malicious NPM Package Impersonates Nodemailer to Drain Crypto Wallets

In the fast-paced world of software development, where open-source libraries power countless applications, a sneaky threat has emerged that could wipe out your cryptocurrency holdings without a trace. A deceptive NPM package, cleverly disguised as the popular Nodemailer email library, has been caught injecting malware into desktop wallets, redirecting funds straight to hackers. Uncovered by

State-Sponsored hacker
News & Updates

State-Sponsored Hackers Dominate Vulnerability Exploits in First Half of 2025: Insights and Trends

In an era where cyber threats evolve faster than defenses can keep up, a startling revelation has emerged: over half of all attributed vulnerability exploits in the first six months of 2025 were orchestrated by state-backed actors. This surge highlights the escalating role of geopolitics in digital warfare, with espionage and surveillance as primary drivers.

Microsoft teams meeting
News & Updates

Phishing Attacks Exploit Microsoft Teams with Fake IT Support to Spread Malware

Cybercriminals are increasingly abusing Microsoft Teams for phishing campaigns, impersonating IT support to trick users into installing malware and granting remote access. Security experts at Permiso have detailed these tactics on [techguideonline.com], revealing how attackers leverage the platform’s trusted environment to bypass traditional defenses and compromise corporate networks. With Teams integral to daily workflows, these

Azure data deleted by storm-0501 ransomware
News & Updates

Storm-0501 Ransomware Evolves: Deleting Data and Backups in Azure After Exfiltration

In a bold shift toward cloud-native threats, a sophisticated ransomware group known as Storm-0501 has been caught destroying victim data and backups directly within Microsoft Azure environments after quietly stealing sensitive information. This marks a dangerous escalation in cyber extortion tactics, where attackers leverage the cloud’s own tools to evade traditional defenses and maximize damage.

Scroll to Top