Android Apple Exploits Malware0 Min Read September 18, 2025 1 in 3 Android Apps Leak Sensitive Data A significant share of mobile applications are exposing sensitive information through insecure APIs, leaving users and businesses vulnerable…
Exploits Linux Vulnerabilities Windows1 Min Read September 18, 2025 Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its…
Apple Linux Vulnerabilities Windows3 Min Read September 18, 2025 Google Confirms Real-World Attacks on Chrome Vulnerability CVE-2025-10585 Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical…
Security2 Min Read September 18, 2025 WatchGuard warns of critical vulnerability in Firebox firewalls WatchGuard has released security updates to address a remote code execution vulnerability impacting the company's Firebox firewalls. Tracked…
Security2 Min Read September 18, 2025 Google patches sixth Chrome zero-day exploited in attacks this year Google has released emergency security updates to patch a Chrome zero-day vulnerability, the sixth one tagged as exploited in attacks since…
Browser Security Vulnerability2 Min Read September 18, 2025 Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
Exploits Malware Phishing Windows0 Min Read September 17, 2025 FileFix Campaign Using Steganography and Multistage Payloads A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted…
Apple Linux Nation-state Vulnerabilities2 Min Read September 17, 2025 CVE-2025-43300: Apple’s Critical Zero-Day ImageIO Vulnerability IntroductionSecurity researchers and Apple users alike are on high alert following the discovery and active exploitation of…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Linux Phishing Web Security Windows0 Min Read September 16, 2025 Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads A new AI-native penetration testing tool called Villager has reached nearly 11,000 downloads on the Python Package Index (PyPI) just two…
Apple Security2 Min Read September 16, 2025 Apple backports zero-day patches to older iPhones and iPads Apple has released security updates to backport patches released last month to older iPhones and iPads, addressing a zero-day bug that…
Apple Spyware Vulnerability2 Min Read September 16, 2025 Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in…
Hardware Security Vulnerability3 Min Read September 16, 2025 Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5)…
Microsoft2 Min Read September 15, 2025 Microsoft says Windows September updates break SMBv1 shares Microsoft has confirmed that the September 2025 Windows security updates are causing connection issues to Server Message Block (SMB) v1…
Browser Security Phishing3 Min Read September 15, 2025 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we'll explore what a…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Android Exploits Mobile Security Vulnerabilities2 Min Read September 15, 2025 Samsung Zero-Day Exploit CVE-2025-21043 Patched After Active Attacks on Android Devices Samsung has released security updates to patch a critical zero-day vulnerability actively exploited against Android devices. Tracked as…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Exploits Network Phishing5 Min Read September 14, 2025 Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Android Exploits Vulnerabilities2 Min Read September 13, 2025 Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Samsung has released its September 2025 security update, addressing a critical zero-day vulnerability that is being actively exploited in the…
Apple Malware Vulnerabilities Windows3 Min Read September 13, 2025 Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
Security2 Min Read September 12, 2025 Samsung patches actively exploited zero-day reported by WhatsApp Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android…
Data Breach DDoS Vulnerabilities Windows2 Min Read September 12, 2025 CVE-2025-10127 (CVSS 9.8): Critical Daikin Flaw Could Give Hackers Full System Access Ddos September 12, 2025 The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory about a critical flaw in…
DDoS Exploits Vulnerabilities Windows2 Min Read September 12, 2025 CISA Urges Immediate Patching: Critical Dassault Systèmes Flaw (CVE-2025-5086) Actively Exploited Ddos September 12, 2025 The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in Dassault Systèmes DELMIA…
Network Phishing Vulnerabilities Windows2 Min Read September 11, 2025 Palo Alto Networks User-ID Credential Agent Vulnerability Exposes password In Cleartext A newly disclosed vulnerability in Palo Alto Networks’ User-ID Credential Agent for Windows, identified as CVE-2025-4235, could…
Exploits Network Ransomware Vulnerabilities3 Min Read September 11, 2025 Australia Warns of Ransomware Attacks Exploiting SonicWall VPN Flaw CVE-2024-40766 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an urgent alert regarding active exploitation of…
DDoS Ransomware Vulnerabilities Windows20 Min Read September 11, 2025 Vulnerability Management – common understanding and language enable teamwork Part of a series This Blog post is part of the series Vulnerability Management Series: 3D (Definition, Deep-Dive, and Difficulties) Part 1…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 11, 2025 Beyond Cobalt Strike: A New Open-Source Hacking Tool Is on the Rise Ddos September 11, 2025 Researchers at Palo Alto Networks’ Unit 42 have published a report detailing the rise of AdaptixC2, an open-source…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 11, 2025 ACSC Warns of Active Exploitation of SonicWall SSL VPN Vulnerability (CVE-2024-40766) Ddos September 11, 2025 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an alert on the active…
Cloud Security Malware Ransomware Vulnerabilities24 Min Read July 16, 2025 I SPy: Escalating to Entra ID's Global Admin with a first-party app This research was presented at fwd:cloudsec North America on June 30th, 2025. You can find the talk here. Key points Service principals (SPs)…
Cloud Security Data Breach Vulnerabilities5 Min Read May 13, 2025 Tales from the cloud trenches: The Attacker doth persist too much, methinks As a result of a recent threat hunt, we observed attacker activity originating from a leaked long-term AWS access key (AKIA*). Within a…
Cloud Security Malware Phishing Ransomware11 Min Read April 17, 2025 Datadog threat roundup: Top insights for Q1 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…