Fisa Academy

Microsoft Reports Medusa-Linked Storm-1175 Accelerating Ransomware Attacks

In a recent blog post, Microsoft highlighted the alarming tactics employed by a threat actor known as Storm-1175. This group has shown a remarkable shift in their attack methodologies, moving beyond the typical usage of N-day vulnerabilities. Instead, they have increasingly leveraged zero-day exploits,...

CUPS Vulnerabilities May Enable Remote Attackers to Attain Root-Level Code Execution

A team of AI-driven vulnerability hunters, led by security researcher Asim Viladi Oglu Manizada, has identified two significant security vulnerabilities in the Common Unix Printing System (CUPS), which serves as the standard printing system for a variety of Linux and Unix-like operating systems. These...
spot_img

Keep exploring

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

 The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a new phishing...

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

 A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...

Pro-Iranian Hacking Group Claims Credit for Hack of FBI Director Kash Patel’s Personal Account

 A pro-Iranian hacking group claimed Friday to have hacked an account of FBI...

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

A China-linked state-sponsored threat actor has deployed kernel implants and passive backdoors deep...

Hackers Use Fake Resumes to Infiltrate Companies and Steal Credentials

A new cyberattack campaign is turning a routine business process into a serious...

Why the Kill Chain No Longer Works

The Model We’ve Always Trusted For a long time, the “kill chain” has been...

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

"Unlike traditional exploit-based attacks, this method relies entirely on user interaction – usually...

North Korean Hackers Use Messaging App to Spread Malware

 A new cybersecurity report from The Hacker News has revealed a dangerous hacking...

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

 Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently...

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

 The ransomware operation known as LeakNet has adopted the ClickFix social engineering tactic delivered through compromised websites...

CISA Warns of Actively Exploited Zimbra and SharePoint Vulnerabilities

A new cybersecurity alert from Cybersecurity and Infrastructure Security Agency has raised serious...

Latest articles

Microsoft Reports Medusa-Linked Storm-1175 Accelerating Ransomware Attacks

In a recent blog post, Microsoft highlighted the alarming tactics employed by a threat...

CUPS Vulnerabilities May Enable Remote Attackers to Attain Root-Level Code Execution

A team of AI-driven vulnerability hunters, led by security researcher Asim Viladi Oglu Manizada,...

What AI Vulnerability Discovery Means for Cyber Defense

 Last week, the industry learned that Anthropic was developing Claude Capybara, also called...

Latest BreachForums Reboot Linked to Faux ShinyHunters Admin

Cybercrime Forum Turmoil: ShinyHunters Disavows Connection to BreachForums Reboot The cybercrime landscape remains fraught with...