Uncategorized3 Min Read September 4, 2025 Google Fined $379 Million by French Regulator for Cookie Consent Violations The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (€325 million) and $175 million…
Mobile Security Vulnerability2 Min Read September 3, 2025 Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September…
Network Security Threat Intelligence4 Min Read September 3, 2025 Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service (DDoS) attack that peaked at…
Data Breach2 Min Read September 3, 2025 Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations Salesloft on Tuesday announced that it’s taking Drift temporarily offline “in the very near future,” as multiple companies…
Uncategorized4 Min Read September 2, 2025 Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The threat actor known as Silver Fox has been attributed to abuse of a previously unknown vulnerable driver associated with WatchDog…
Malvertising Mobile Security3 Min Read September 1, 2025 Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used…
Uncategorized19 Min Read September 1, 2025 ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update,…
Browser Security Threat Intelligence5 Min Read September 1, 2025 When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of…
Malware3 Min Read September 1, 2025 ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka…
Cloud Security DDoS Linux Ransomware Windows2 Min Read September 1, 2025 Another Ryzen 9000 CPU Burnout: What’s Really Going On? Ddos September 1, 2025 Earlier this year, reports emerged of Asrock motherboards paired with processors such as the 9800X3D suffering…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
DDoS Ransomware Vulnerabilities2 Min Read August 31, 2025 Meta’s New AI NPCs Will Make Horizon Worlds Come to Life Ddos August 31, 2025 Meta is once again infusing its metaverse platform, Horizon Worlds, with generative AI experiences, enabling developers…
Security3 Min Read August 30, 2025 TamperedChef infostealer delivered through fraudulent PDF Editor Threat actors have been using multiple websites promoted through Google ads to distribute a convincing PDF editing app that delivers an…
DDoS Vulnerabilities3 Min Read August 30, 2025 Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed A critical zero-day vulnerability in Citrix NetScaler products, identified as CVE-2025-6543, has been actively exploited by threat actors…
Apple Malware Vulnerabilities2 Min Read August 29, 2025 WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific…
Malware Threat Intelligence2 Min Read August 29, 2025 Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked…
Cyber Espionage Malware4 Min Read August 29, 2025 Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an…
Malware3 Min Read August 29, 2025 Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal…
Data Breach2 Min Read August 29, 2025 Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope than…
Malware3 Min Read August 29, 2025 TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites…
Security2 Min Read August 28, 2025 Google warns Salesloft breach impacted some Workspace accounts Google now reports that the Salesloft Drift breach is larger than initially thought, warning that attackers also used stolen OAuth tokens to…
Google2 Min Read August 28, 2025 Google shares workarounds for auth failures on ChromeOS devices Google is working to resolve authentication issues affecting some ChromeOS devices, which are preventing affected users from signing into…
Malware Ransomware3 Min Read August 28, 2025 Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of…
Cyber Espionage Network Security4 Min Read August 28, 2025 Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world,…
Network Ransomware Vulnerabilities3 Min Read August 28, 2025 UK and US Blame Three Chinese Tech Firms for Global Cyberattacks A coalition of international cybersecurity agencies led by the UK’s National Cyber Security Centre (NCSC) has publicly linked three…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 Google Big Sleep AI Tool Finds Critical Chrome Vulnerability Google has patched a critical graphics library vulnerability in the Chrome browser, discovered by its AI-powered detection tool, Google Big…
Cloud Security5 Min Read August 28, 2025 Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the…
Artificial Intelligence Ransomware3 Min Read August 28, 2025 Someone Created First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock.…
Cloud Security Threat Intelligence3 Min Read August 28, 2025 Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens…
Malware Threat Intelligence3 Min Read August 28, 2025 Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May…
Security2 Min Read August 28, 2025 Google to verify all Android devs to protect users from malware Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from…
Cloud Security Data Breach3 Min Read August 28, 2025 New Data Theft Campaign Targets Salesforce via Salesloft App Salesforce customers have again been targeted in a “widespread data theft campaign,” this time via compromised OAuth tokens…
Apple Malware Ransomware Vulnerabilities4 Min Read August 28, 2025 Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day…
Mobile Security Vulnerability3 Min Read August 27, 2025 New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue…
Ransomware4 Min Read August 27, 2025 ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA…
Android Data Breach Malware Phishing Ransomware Windows4 Min Read August 27, 2025 HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
Security2 Min Read August 27, 2025 Google to verify all Android devs to block malware on Google Play Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from…
Security2 Min Read August 27, 2025 Silk Typhoon hackers hijack network captive portals in diplomat attacks State-sponsored hackers linked to the Silk Typhoon activity cluster targeted diplomats by hijacking web traffic to redirect to a…
Security3 Min Read August 27, 2025 Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks Update: Story updated with further information. Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from…
Android Malware Phishing Ransomware2 Min Read August 27, 2025 New Android Trojan Variant Expands with Ransomware Tactics A new version of the Hook Android banking Trojan has surfaced, showcasing one of the most extensive feature sets ever recorded for mobile…
Cloud Security Data Breach Malware Phishing Ransomware Vulnerabilities5 Min Read August 27, 2025 Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However,…