Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Botnet Vulnerability4 Min Read December 10, 2025 React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
Malware Vulnerability4 Min Read December 9, 2025 North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in…
Cybersecurity Hacking News14 Min Read December 8, 2025 ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake…
AI Security Vulnerability5 Min Read December 6, 2025 Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments…
Patch Management Vulnerability3 Min Read December 6, 2025 Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server…
Network Security Zero-Day5 Min Read December 5, 2025 CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put…
Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Data Privacy Web Security6 Min Read December 4, 2025 5 Threats That Reshaped Web Security This Year [2025] As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become dangerously…
December 4, 2025 CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js Key points and observations On December 3, a remote code code execution (RCE) vulnerability was identified in React Server Components and…
Blockchain Malware2 Min Read December 2, 2025 GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Malware Supply Chain Attack2 Min Read November 28, 2025 North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious…
Cybersecurity Hacking News14 Min Read November 27, 2025 ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a…
Malware Supply Chain4 Min Read November 26, 2025 Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the…
Cloud Security Vulnerability3 Min Read November 24, 2025 Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of…
Cloud Computing Vulnerability3 Min Read November 20, 2025 ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI)…
Malware Social Engineering2 Min Read November 18, 2025 Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Malware Threat Intelligence2 Min Read November 14, 2025 North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Malware Software Supply Chain6 Min Read November 13, 2025 Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake…
AI Security Regulatory Compliance6 Min Read November 11, 2025 CISO's Expert Guide To AI Supply Chain Attacks AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect…
Malware Software Supply Chain2 Min Read November 11, 2025 Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact"…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Cloud Security Data Protection4 Min Read November 7, 2025 Enterprise Credentials at Risk – Same Old, Same Old? Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…
Malware Supply Chain Attack3 Min Read November 7, 2025 Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to…
Artificial Intelligence Vulnerability5 Min Read November 5, 2025 Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI's ChatGPT artificial intelligence (AI) chatbot that…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Cybercrime Malware2 Min Read October 30, 2025 Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are…
DevSecOps Software Security2 Min Read October 30, 2025 PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100…
Data Breach Malware6 Min Read October 28, 2025 Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
Hacking News Malware3 Min Read October 24, 2025 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing…
DevOps Malware3 Min Read October 24, 2025 Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX…
Data Protection DevOps2 Min Read October 23, 2025 Why Organizations Are Abandoning Static Secrets for Managed Identities As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials.…
Cyber Espionage Network Security2 Min Read October 22, 2025 Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed…
Cloud Security Malware3 Min Read October 16, 2025 Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the…
Cybersecurity Hacking News15 Min Read October 16, 2025 ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it's become to turn everyday technology into a…
Malware Software Supply Chain3 Min Read October 15, 2025 Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by…
Security2 Min Read October 14, 2025 Malicious crypto-stealing VSCode extensions resurface on OpenVSX A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft's Visual Code (VSCode)…