Cyber Espionage Network Security2 Min Read October 22, 2025 Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, acco…
3 Min Read October 22, 2025 TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution Cybersecurity researchers have disclosed details of a high-severity flaw… Data Protection Vulnerability
2 Min Read October 22, 2025 TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution TP-Link has released security updates to address four security flaws… Network Security Vulnerability
2 Min Read October 21, 2025 Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams Meta on Tuesday said it's launching new tools to protect Messenger and… Cryptocurrency Encryption
Security3 Min Read October 9, 2025 Hackers claim Discord breach exposed data of 5.5 million users Discord says they will not be paying threat actors who claim to have stolen the data of 5.5 million unique users from the company's Zendesk…
Security4 Min Read October 8, 2025 New FileFix attack uses cache smuggling to evade security software A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
Security2 Min Read October 8, 2025 Qilin ransomware claims Asahi brewery attack, leaks data The Qilin ransomware group has claimed the attack on Japanese beer giant Asahi by adding the company to the list of victims on its data leak…
Microsoft2 Min Read October 8, 2025 Microsoft 365 outage blocks access to Teams, Exchange Online Microsoft is working to resolve an ongoing outage preventing users from accessing Microsoft 365 services, including Microsoft Teams,…
Microsoft2 Min Read October 8, 2025 Microsoft enables Exchange Online auto-archiving by default Microsoft is enabling threshold-based auto-archiving by default in Exchange Online to prevent email flow issues caused by mailboxes filling up…
Cloud Security2 Min Read October 8, 2025 Crimson Collective hackers target AWS cloud instances for data theft The 'Crimson Collective' threat group has been targeting AWS (Amazon Web Services) cloud environments for the past weeks, to steal data…
Data Security Malware4 Min Read October 8, 2025 Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
Children Cyber Attack Cyber Crime Cybersecurity Kido Nursery Privacy United Kingdom2 Min Read October 8, 2025 UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack The UK Metropolitan Police (Met) have arrested two 17-year-old boys in connection with the major ransomware attack that compromised the data…
Security2 Min Read October 8, 2025 Hackers exploit auth bypass in Service Finder WordPress theme Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass…
Education Security2 Min Read October 8, 2025 London police arrests suspects linked to nursery breach, child doxing The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack…
DDoS Exploits Vulnerabilities Windows3 Min Read October 8, 2025 Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
Linux Ransomware Vulnerabilities Windows25 Min Read October 8, 2025 Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the…
Malware Threat Intelligence2 Min Read October 8, 2025 Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it…
Data Breach Network Windows4 Min Read October 8, 2025 Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and…
Cloud Security Malware Ransomware Windows2 Min Read October 8, 2025 Nezha Tool Used in New Cyber Campaign Targeting Web Applications A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
Apple Exploits Vulnerabilities2 Min Read October 8, 2025 Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and…
Cloud Security DDoS Phishing Ransomware3 Min Read October 8, 2025 Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000 Google has unveiled a new AI Vulnerability Reward Program (VRP), offering payouts of up to $30,000 for researchers who successfully identify…
Cyber Attacks Password Security1 Min Read October 8, 2025 Step Into the Password Graveyard… If You Dare (and Join the Live Session) Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don't need…
Cybercrime Malware3 Min Read October 8, 2025 LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring…
Phishing Ransomware2 Min Read October 8, 2025 Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue A sharp rise in digital fraud is costing companies worldwide an average of 7.7% of annual revenue, according to TransUnion’s H2 2025…
Cloud Security Linux Vulnerabilities Windows2 Min Read October 8, 2025 Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to non-administrator…
AI Artificial Intelligence ChatGPT Cyber Crime Cybersecurity FraudGPT MatrixPDF OpenAI Security SpamGPT WormGPT4 Min Read October 8, 2025 OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more…
Software Security Vulnerability3 Min Read October 8, 2025 Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol…
Exploits Vulnerabilities2 Min Read October 8, 2025 PoC Exploit Released for Critical Lua Engine Vulnerabilities Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
Ransomware Supply Chain2 Min Read October 8, 2025 Cyber-Attack Contributes to Huge Sales Drop at JLR Jaguar Land Rover (JLR) has revealed a 25% drop in volume sales in the three months up to September 30, largely as a result of the ongoing…
Cybersecurity Discord Identity theft Infostealer Malware Point Wild Privacy Security Shuyal Stealer Windows3 Min Read October 8, 2025 New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have found a new infostealer called Shuyal Stealer, a malware…
Ransomware Social Engineering2 Min Read October 8, 2025 Bybit Theft Drives Record-Breaking $2bn Haul for North Korea North Korea-backed threat actors have stolen more than $2bn in cryptocurrency this year to fund the hermit state’s missile and nuclear…
Ransomware2 Min Read October 8, 2025 Met Police Arrest Two Teens in Connection with Kido Attack Two teenaged boys have been arrested following a cyber-attack and attempted extortion of a London nursery group, the Metropolitan Police has…
Email Security ICS/OT Ransomware Vulnerabilities2 Min Read October 8, 2025 CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks CISA has issued a critical warning regarding a zero-day cross-site scripting (XSS) vulnerability in Synacor’s Zimbra Collaboration Suite…
Linux Ransomware Vulnerabilities Windows2 Min Read October 8, 2025 Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks Google has released Chrome version 141.0.7390.65/.66 for Windows and Mac, along with 141.0.7390.65 for Linux, addressing multiple critical…
Artificial Intelligence Threat Intelligence5 Min Read October 8, 2025 OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…
Ransomware Windows2 Min Read October 8, 2025 Microsoft Signs 100 MW Solar PPA with Shizen Energy to Power AI in Japan Microsoft continues to advance its renewable energy transition in Japan, having recently confirmed the signing of three new solar Power…
Apple Malware Vulnerabilities2 Min Read October 8, 2025 Evernote Relaunches as AI-First Note App with Semantic Search and OpenAI Assistant Once the defining name in note-taking applications, Evernote had seen its presence wane in recent years. Yet under the stewardship of Italian…
Cloud Security Phishing Ransomware Vulnerabilities2 Min Read October 8, 2025 Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS Amazon Web Services (AWS) has released an important bulletin warning users of a critical local privilege escalation in the AWS Client VPN…
DDoS Exploits Vulnerabilities3 Min Read October 8, 2025 Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available researchers have identified two critical in Nagios Log Server, the enterprise log management solution widely used for centralized logging,…
Cloud Security Malware Phishing Vulnerabilities2 Min Read October 8, 2025 Zimbra XSS Zero-Day (CVE-2025-27915) Actively Exploited; CISA Adds to KEV Catalog A cross-site scripting (XSS) in Synacor Zimbra Collaboration Suite (ZCS) — tracked as CVE-2025-27915 — has been confirmed to be…
Exploits Ransomware Vulnerabilities2 Min Read October 8, 2025 OpenSSH Flaw (CVE-2025-61984) Allows Remote Code Execution via Usernames researcher David Leadbeater has disclosed a in OpenSSH, identified as CVE-2025-61984, which highlights how even minor quirks in command-line…
Data Breach Ransomware Vulnerabilities Windows2 Min Read October 8, 2025 Chrome 141 Stable Fixes Two High-Severity Flaws: Heap Overflow in Sync and UAF in Storage Google has released a new Stable Channel update for Chrome 141.0.7390.65/.66 on Windows and macOS and 141.0.7390.65 for Linux, addressing…
Exploits Malware Network Vulnerabilities3 Min Read October 8, 2025 Actively Exploited: Critical Flaw CVE-2025-5947 (CVSS 9.8) Allows Unauthenticated Admin Takeover in WordPress Plugin researchers at Wordfence have issued an urgent warning about an actively exploited authentication bypass in the Service Finder Bookings plugin…
Exploits ICS/OT Vulnerabilities Web Security2 Min Read October 8, 2025 CISA Adds Zimbra XSS Flaw to KEV After Active Exploitation On October 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-27915—an actively exploited vulnerability…
Security3 Min Read October 8, 2025 Salesforce refuses to pay ransom over widespread data theft attacks Salesforce has confirmed that it will not negotiate with or pay a ransom to the threat actors behind a massive wave of data theft attacks that…
Data Breach Phishing Ransomware Vulnerabilities6 Min Read October 7, 2025 ShinyHunters Wage Broad Corporate Extortion Spree A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…