Data Breach Ransomware Vulnerabilities Windows2 Min Read September 18, 2025 GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware The cyberthreat landscape has witnessed the emergence of another sophisticated ransomware operation as GOLD SALEM, a new threat actor group…
Linux Malware Vulnerabilities Windows2 Min Read September 18, 2025 Google pushes emergency patch for Chrome 0-day – check your browser version now Google pushed an emergency patch for a high-severity Chrome flaw, already under active exploitation. So it's time to make sure you're running…
Cloud Security Vulnerabilities Windows3 Min Read September 18, 2025 Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control A critical vulnerability in Microsoft’s Entra ID could have allowed an attacker to gain complete administrative control over any tenant…
Cybercrime Malware3 Min Read September 18, 2025 CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to…
Exploits Linux Vulnerabilities Windows1 Min Read September 18, 2025 Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its…
Apple Linux Vulnerabilities Windows3 Min Read September 18, 2025 Google Confirms Real-World Attacks on Chrome Vulnerability CVE-2025-10585 Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical…
Cloud Security Data Breach Network Ransomware2 Min Read September 18, 2025 SolarWinds Issues Advisory on Salesforce Data Breach Linked to Salesloft Drift SolarWinds has issued a security advisory regarding a major Salesforce data breach that exposed sensitive information from numerous companies…
Security2 Min Read September 18, 2025 Google patches sixth Chrome zero-day exploited in attacks this year Google has released emergency security updates to patch a Chrome zero-day vulnerability, the sixth one tagged as exploited in attacks since…
Browser Security Vulnerability2 Min Read September 18, 2025 Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
Data Breach Exploits Vulnerabilities Windows3 Min Read September 18, 2025 Phoenix (CVE-2025-6202): A New Rowhammer Attack Bypasses DDR5 Protections Researchers from ETH Zurich have unveiled Phoenix, a new Rowhammer attack that successfully bypasses in-DRAM mitigations in all tested SK…
Security3 Min Read September 17, 2025 ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft…
Exploits IoT Security Web Security Windows6 Min Read September 17, 2025 How LLMs can be compromised in 2025 | Kaspersky official blog Developers of LLM-powered public services and business applications are working hard to ensure the security of their products, but the…
Exploits Mobile Security Network Vulnerabilities2 Min Read September 17, 2025 Critical WatchGuard Vulnerability Allows Unauthenticated Attacker to Execute Arbitrary Code A critical vulnerability has been discovered in WatchGuard’s Firebox firewalls, which could allow a remote, unauthenticated attacker to…
Apple Exploits Linux Vulnerabilities2 Min Read September 17, 2025 Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad Apple has released iOS 16.7.12 and iPadOS 16.7.12 on September 15, 2025, delivering critical security updates to older-generation…
Cybercrime Threat Intelligence3 Min Read September 17, 2025 Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims Cybersecurity researchers have tied a fresh round of cyber attacks targeting financial services to the notorious cybercrime group known as…
Security2 Min Read September 16, 2025 Google nukes 224 Android malware apps behind massive ad fraud campaign A massive Android ad fraud operation dubbed "SlopAds" was disrupted after 224 malicious applications on Google Play were used to generate…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Security4 Min Read September 16, 2025 Self-propagating supply chain attack hits 187 npm packages Security researchers have identified at least 187 npm packages compromised in an ongoing supply chain attack, with a malicious…
Data Breach Ransomware0 Min Read September 16, 2025 Gucci and Alexander McQueen Hit by Customer Data Breach Luxury fashion brands Gucci, Alexander McQueen and Balenciaga have suffered a customer data breach, in another attack linked to the…
Ad Fraud Mobile Security2 Min Read September 16, 2025 SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228…
Security2 Min Read September 16, 2025 Jaguar Land Rover extends shutdown after cyberattack by another week Jaguar Land Rover (JLR) announced today that it will extend the production shutdown for another week, following a devastating cyberattack that…
Malware Social Engineering3 Min Read September 16, 2025 New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the…
Apple Linux Vulnerabilities Windows2 Min Read September 16, 2025 Chrome’s New Preloading is a Game-Changer Google has long experimented with prerendering technology in Chrome to accelerate page loading by rendering content in advance so that pages…
Linux2 Min Read September 16, 2025 China Accuses NVIDIA of Anti-Monopoly Violations China’s State Administration for Market Regulation (SAMR) issued a statement today declaring that NVIDIA’s $6.9 billion…
Linux Ransomware Vulnerabilities Windows8 Min Read September 16, 2025 Nessus vs Metasploit Comparison: How To Exploit Vulnerabilities Using These Powerful Tools The cybersecurity landscape demands sophisticated tools to identify and exploit vulnerabilities effectively, with Nessus vs Metasploit…
Hardware Security Vulnerability3 Min Read September 16, 2025 Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5)…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Google Security2 Min Read September 15, 2025 Google confirms fraudulent account created in law enforcement portal Google has confirmed that hackers created a fraudulent account in its Law Enforcement Request System (LERS) platform that law enforcement uses…
Security3 Min Read September 15, 2025 New Phoenix attack bypasses Rowhammer defenses in DDR5 memory Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Vulnerabilities2 Min Read September 15, 2025 Critical LangChainGo Vulnerability Let Attackers Access Sensitive Files by Injecting Malicious Prompts A high-severity vulnerability was identified in LangChainGo, the Go implementation of the popular LLM orchestration framework LangChain. …
Cloud Security Malware Ransomware Windows2 Min Read September 15, 2025 OpenAI’s New Grove Incubator Is Building the Next Generation of AI Startups OpenAI recently unveiled its internal incubation initiative, OpenAI Grove. Unlike traditional startup accelerators or incubator programs,…
Exploits Vulnerabilities2 Min Read September 15, 2025 IBM QRadar SIEM Vulnerability Let Attackers Perform Unauthorized Actions A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local…
Android Exploits Mobile Security Vulnerabilities2 Min Read September 15, 2025 Samsung Zero-Day Exploit CVE-2025-21043 Patched After Active Attacks on Android Devices Samsung has released security updates to patch a critical zero-day vulnerability actively exploited against Android devices. Tracked as…
Malware Phishing Ransomware Windows7 Min Read September 15, 2025 ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its…
Exploits Network Vulnerabilities Web Security3 Min Read September 15, 2025 FlowiseAI Password Reset Token Vulnerability Allows Account Takeover A critical vulnerability affecting FlowiseAI’s Flowise platform has been disclosed, revealing a severe authentication bypass flaw that…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
DDoS Exploits Linux Vulnerabilities2 Min Read September 15, 2025 Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…
Android Cyber Attack Cybersecurity Meta Samsung Security Vulnerability WhatsApp2 Min Read September 14, 2025 Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The issue,…
Security3 Min Read September 14, 2025 FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’…
Security2 Min Read September 14, 2025 New VoidProxy phishing service targets Microsoft 365, Google accounts A newly discovered phishing-as-a-service (PhaaS) platform, named VoidProxy, targets Microsoft 365 and Google accounts, including those…