Stay informed with the latest trends and developments in cybersecurity.
Disclaimer: TenGuard Watch provides curated summaries of articles from trusted sources like The Hacker News, SecurityWeek, and BleepingComputer. For full content, visit the original publication by following the provided links.
Summary: Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed Wonderland in mobile attacks targeting users in Uzb...
Impact: Malicious software campaign targeting users and organizations.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years after the hacking group was observed targeting victims in S...
Impact: Malicious software campaign targeting users and organizations.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a multi-million dollar ATM jackpotting scheme. The large-scale conspiracy involved deploy...
Impact: Malicious software campaign targeting users and organizations.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover a...
Impact: Social engineering campaign targeting users with fraudulent communications.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector for a new version of a modular and stealthy loader known a...
Impact: Malicious software campaign targeting users and organizations.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks. Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability...
Impact: Critical vulnerability requiring immediate attention and patching.
Source: The Hacker News - Read Full Article
Read Full ArticleSummary: The British government is investigating a “cyber incident” following news reports that hackers linked to China have gained access to thousands of confidential documents.
Impact: Unauthorized access campaign targeting systems and data.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference.
Impact: Cybersecurity development requiring attention and monitoring.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: Other noteworthy stories that might have slipped under the radar: Trump could use private firms for cyber offensive, China threat to US power grid, RaccoonO365 suspect arrested in Nigeria.
Impact: Emerging threat affecting cybersecurity landscape and requiring awareness.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and adopts Google’s Vertex AI and Gemini models.
Impact: Cybersecurity development requiring attention and monitoring.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: The startup’s solution captures, verifies, and governs all AI interactions within an enterprise’s environment.
Impact: Cybersecurity development requiring attention and monitoring.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: Danish intelligence service said the attacks were part of Russia’s “hybrid war” against the West and an attempt to create instability.
Impact: Cyber attack campaign targeting organizations and individuals.
Source: SecurityWeek - Read Full Article
Read Full ArticleSummary: Over 115,000 WatchGuard Firebox devices exposed online remain unpatched against a critical remote code execution (RCE) vulnerability actively exploited in attacks.
Impact: Critical vulnerability requiring immediate attention and patching.
Source: BleepingComputer - Read Full Article
Read Full ArticleSummary: More than a 1,000 Docker Hardened Images (DHI) are now freely available and open source for software builders, under the Apache 2.0 license.
Impact: Cybersecurity development requiring attention and monitoring.
Source: BleepingComputer - Read Full Article
Read Full ArticleSummary: Modern attacks have shifted focus to the browser, yet detection tools remain largely blind to the crucial activity happening there.
Impact: Cyber attack campaign targeting organizations and individuals.
Source: BleepingComputer - Read Full Article
Read Full ArticleSummary: Finding a reliable extra laptop for your home, commute, or travel bag doesn't have to come with a painful price tag. During this sale, you can grab a refurbished Lenovo 300e Chromebook (2018) with an ...
Impact: Cybersecurity development requiring attention and monitoring.
Source: BleepingComputer - Read Full Article
Read Full Article