Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
Malware Software Security2 Min Read September 20, 2025 LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that…
Artificial Intelligence Cloud Security3 Min Read September 20, 2025 ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent Cybersecurity researchers have disclosed a zero-click flaw in OpenAI ChatGPT's Deep Research agent that could allow an attacker to leak…
Malware Ransomware Vulnerabilities Windows14 Min Read September 20, 2025 WannaCry Ransomware: A DFIR & SOC Monitoring Lab Walkthrough Hello fellow defenders, I hope you are having a great day. In this article, I’m going to show you how you can make a cybersecurity home…
Security2 Min Read September 18, 2025 PyPI invalidates tokens stolen in GhostAction supply chain attack The Python Software Foundation team has invalidated all PyPI tokens stolen in the GhostAction supply chain attack in early September,…
Cybercrime Malware3 Min Read September 18, 2025 CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to…
Exploits Linux Vulnerabilities2 Min Read September 18, 2025 From Simple Bug to RCE: A Flaw (CVE-2025-21692) in the Linux Kernel, PoC Published Security researcher Volticks has published a deep technical writeup on CVE-2025-21692, a vulnerability in the Linux kernel’s Enhanced…
Security3 Min Read September 17, 2025 ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft…
Cloud Security Malware Ransomware Supply Chain0 Min Read September 17, 2025 Shai-Hulud Worm Prowls npm to Steal Hundreds of Secrets For the third time in just a few weeks, experts are warning of a significant threat to the open source npm ecosystem, after discovering a…
Security4 Min Read September 16, 2025 Self-propagating supply chain attack hits 187 npm packages Security researchers have identified at least 187 npm packages compromised in an ongoing supply chain attack, with a malicious…
Cyber Attack Malware2 Min Read September 16, 2025 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages…
Google Security2 Min Read September 15, 2025 Google confirms fraudulent account created in law enforcement portal Google has confirmed that hackers created a fraudulent account in its Law Enforcement Request System (LERS) platform that law enforcement uses…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
Exploits Ransomware Vulnerabilities2 Min Read September 15, 2025 CVE-2025-9556 (CVSS 9.8):Critical Vulnerability in LangChainGo Puts LLM Apps at Risk The rise of large language model (LLM) applications has made frameworks like LangChain and its ports foundational for developers worldwide.…
Security3 Min Read September 14, 2025 FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’…
Cyber Attack Data Breach3 Min Read September 13, 2025 FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two…
Security3 Min Read September 13, 2025 New HybridPetya ransomware can bypass UEFI Secure Boot A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious application on…
AI Security Vulnerability4 Min Read September 12, 2025 Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a…
ICS/OT Network Ransomware Vulnerabilities0 Min Read September 11, 2025 CISA Launches Roadmap for the CVE Program In a new document, the US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed its support for the Common Vulnerabilities and…
DDoS Ransomware Vulnerabilities Windows20 Min Read September 11, 2025 Vulnerability Management – common understanding and language enable teamwork Part of a series This Blog post is part of the series Vulnerability Management Series: 3D (Definition, Deep-Dive, and Difficulties) Part 1…
September 11, 2025 CVE-2025-58063: CoreDNS Vulnerability Could Disrupt DNS Updates Ddos September 11, 2025 The CoreDNS project has disclosed a vulnerability in its etcd plugin, tracked as CVE-2025-58063 (CVSS 7.1), which…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…
Malware Ransomware4 Min Read September 9, 2025 Open Source Community Thwarts Massive npm Supply Chain Attack A potential npm supply chain disaster was averted in record time after attackers took over a verified developer’s credentials. On September 8,…
Cloud Security Network Ransomware2 Min Read September 9, 2025 Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign A major data theft campaign targeting Salesforce data via the Salesloft Drift app began after threat actors compromised a key GitHub account,…
Supply Chain Attack2 Min Read September 8, 2025 GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies Salesloft has revealed that the data breach linked to its Drift application started with the compromise of its GitHub account. Google-owned…
Encryption Malvertising3 Min Read September 8, 2025 GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Cloud Security2 Min Read September 8, 2025 GhostAction Supply Chain Attack Compromises 3000+ Secrets Hundreds of GitHub users and repositories have been hit by another supply chain attack, in which threat actors have already stolen more than…
Botnet Malware4 Min Read September 5, 2025 TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan…
Malware2 Min Read September 3, 2025 Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum…
Artificial Intelligence Vulnerability2 Min Read September 3, 2025 Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike AI to exploit…
Uncategorized19 Min Read September 1, 2025 ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update,…
Malware3 Min Read September 1, 2025 ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka…
DDoS Vulnerabilities3 Min Read August 30, 2025 Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed A critical zero-day vulnerability in Citrix NetScaler products, identified as CVE-2025-6543, has been actively exploited by threat actors…
Microsoft Security2 Min Read August 29, 2025 Microsoft to enforce MFA for Azure resource management in October Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure…
Malware3 Min Read August 29, 2025 Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal…
Cloud Security5 Min Read August 28, 2025 Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the…
Artificial Intelligence Malware3 Min Read August 28, 2025 U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions against two…
Artificial Intelligence Ransomware3 Min Read August 28, 2025 Someone Created First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock.…