Data Breach Malware4 Min Read September 26, 2025 New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Malware Ransomware Vulnerabilities Windows3 Min Read September 25, 2025 Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms Chinese cyber threat actors are suspected of deploying a recently identified backdoor to get a foothold into the systems of US organizations…
Ransomware Vulnerabilities Web Security2 Min Read September 25, 2025 Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening websites powered by…
Botnets Email Security Malware2 Min Read September 25, 2025 Hidden Backdoors in WordPress: How Attackers Use Fake Plugins and Core Files for Persistent Access Security researcher Puja Srivastava from Sucuri uncovered two malicious files designed to guarantee persistent attacker access by manipulating…
Apple DDoS Network Vulnerabilities3 Min Read September 24, 2025 Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE software, confirming it is being actively…
Mobile Security3 Min Read September 24, 2025 Unpatched flaw in OnePlus phones lets rogue apps text messages A vulnerability in multiple versions of OxygenOS, the Android-based operating system from OnePlus, allows any installed app to access SMS data…
Cyber Espionage Threat Intelligence4 Min Read September 24, 2025 UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the…
Linux Malware Vulnerabilities Windows5 Min Read September 24, 2025 Google warns China-linked spies lurking in 'numerous' enterprises since March Unknown intruders – likely China-linked spies – have broken into "numerous" enterprise networks since March and deployed…
Security2 Min Read September 24, 2025 Google: Brickstone malware used to steal U.S. orgs' data for over a year Suspected Chinese hackers have used the Brickstorm malware in long-term persistence espionage operations against U.S. organizations in the…
Cryptocurrency Security2 Min Read September 24, 2025 GitHub notifications abused to impersonate Y Combinator for crypto theft A massive phishing campaign targeted GitHub users with cryptocurrency drainers, delivered via fake invitations to the Y Combinator (YC) W2026…
Payment Security Web Security5 Min Read September 24, 2025 iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit…
Cloud Security Vulnerability4 Min Read September 24, 2025 Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part…
DDoS Linux Vulnerabilities Windows3 Min Read September 24, 2025 Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System Google has issued an urgent security update for its Chrome web browser to address three high-severity vulnerabilities that could allow…
Vulnerabilities Web Security Windows2 Min Read September 24, 2025 CVE-2025-59545: Critical XSS Flaw in DNN Software Puts 750,000 Websites at Risk DNN Software has issued a security advisory warning of a critical stored cross-site scripting (XSS) vulnerability in its Prompt module,…
Exploits Linux Vulnerabilities Windows2 Min Read September 24, 2025 Google Chrome Patches Three High-Severity Flaws in V8 Engine Google has released a Stable Channel Update for Desktop with builds 140.0.7339.207/.208 for Windows and Mac and 140.0.7339.207 for Linux. The…
Malware Network Ransomware Vulnerabilities2 Min Read September 23, 2025 SonicWall releases rootkit-busting firmware update following wave of attacks SonicWall on Monday released a firmware update that the security vendor says will remove rootkit malware deployed in recent attacks targeting…
Malware Network Ransomware Vulnerabilities2 Min Read September 23, 2025 SonicWall Releases Urgent Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices SonicWall has issued an urgent firmware update, version 10.2.2.2-92sv, for its Secure Mobile Access (SMA) 100 series appliances to detect and…
Security2 Min Read September 23, 2025 SonicWall releases SMA100 firmware update to wipe rootkit malware SonicWall has released a firmware update that can help customers remove rootkit malware deployed in attacks targeting SMA 100 series devices.…
Email Security Nation-state Vulnerabilities2 Min Read September 23, 2025 Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands A critical security flaw in Libraesva ESG email security gateways has been identified and patched, allowing threat actors to execute arbitrary…
Vulnerabilities Web Security Windows2 Min Read September 23, 2025 CVE-2025-9125: Cross-Site Scripting Flaw in Lectora Courses Puts E-Learning Platforms at Risk The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of a cross-site scripting (XSS) flaw affecting Lectora, a…
Data Breach Malware Ransomware Windows3 Min Read September 23, 2025 Kawa4096: A New Ransomware Group with Akira-Style Branding and Qilin-Like Notes In June 2025, a new ransomware group known as Kawa4096 surfaced, launching disruptive attacks against multinational organizations in finance,…
Security2 Min Read September 22, 2025 Automaker giant Stellantis confirms data breach after Salesforce hack Automotive manufacturing giant Stellantis has confirmed that attackers stole some of its North American customers' data after gaining access…
Security2 Min Read September 22, 2025 LastPass: Fake password managers infect Mac users with malware LastPass is warning users of a campaign that targets macOS users with malicious software impersonating popular products delivered through…
Data Breach Linux Web Security3 Min Read September 22, 2025 JWT Warfare: Obfuscation, Cracking, and Red Team Exploits | Cyber Codex What is JWT?JWT (JSON Web Token) is a compact, URL-safe method of representing claims between two parties. It is used mostly in stateless…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Security4 Min Read September 21, 2025 Microsoft Entra ID flaw allowed hijacking any company's tenant A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
DDoS Malware Ransomware Vulnerabilities7 Min Read September 20, 2025 Top Zero-Day Vulnerabilities Exploited in the Wild in 2025 The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.…
Malware Software Security2 Min Read September 20, 2025 LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that…
Artificial Intelligence Cloud Security3 Min Read September 20, 2025 ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent Cybersecurity researchers have disclosed a zero-click flaw in OpenAI ChatGPT's Deep Research agent that could allow an attacker to leak…
Malware Ransomware Vulnerabilities Windows14 Min Read September 20, 2025 WannaCry Ransomware: A DFIR & SOC Monitoring Lab Walkthrough Hello fellow defenders, I hope you are having a great day. In this article, I’m going to show you how you can make a cybersecurity home…
Cyber Espionage Threat Intelligence5 Min Read September 19, 2025 UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies,…
Network Vulnerabilities2 Min Read September 19, 2025 Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication A critical authentication bypass vulnerability has emerged in Nokia’s CloudBand Infrastructure Software (CBIS) and Nokia Container…
Exploits Malware Ransomware Vulnerabilities3 Min Read September 19, 2025 CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding sophisticated malware campaigns targeting…
Data Breach Network Ransomware Vulnerabilities2 Min Read September 19, 2025 Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cybersecurity researchers have identified a potential connection between two Yemen-based cybercriminal organizations, the Belsen Group and…
Exploits Network Ransomware Vulnerabilities2 Min Read September 19, 2025 Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation A deserialization flaw in the License Servlet component of Fortra GoAnywhere Managed File Transfer (MFT) platform. Identified as…
Vulnerabilities2 Min Read September 19, 2025 HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks A newly disclosed flaw in HubSpot’s open-source Jinjava template engine could allow attackers to bypass sandbox restrictions and achieve…
Artificial Intelligence Technology1 Min Read September 18, 2025 ChatGPT Search is now smarter as OpenAI takes on Google Search OpenAI has rolled out a big update to ChatGPT Search, which is an AI-powered search feature, similar to Google AI Mode. After a recent update,…
Data Breach Ransomware Vulnerabilities Windows2 Min Read September 18, 2025 GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware The cyberthreat landscape has witnessed the emergence of another sophisticated ransomware operation as GOLD SALEM, a new threat actor group…