Network Vulnerabilities2 Min Read September 9, 2025 FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands Fortinet has disclosed a medium-severity vulnerability in its FortiDDoS-F product line that could allow a privileged attacker to execute…
Malware Phishing2 Min Read September 9, 2025 Threat Actor Accidentally Exposes AI-Powered Operations A threat actor has unintentionally revealed their methods and day-to-day activities after installing Huntress security software on their own…
Ransomware Vulnerabilities2 Min Read September 9, 2025 Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code Ivanti has released security updates to address two high-severity vulnerabilities in its Endpoint Manager (EPM) software that could allow…
Email Security Phishing4 Min Read September 9, 2025 Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly…
Apple DDoS Ransomware Vulnerabilities Windows2 Min Read September 9, 2025 Zoom Security Update – Patch for Multiple Vulnerabilities in Clients for Windows and macOS Zoom released a security update addressing multiple vulnerabilities in its software, including Zoom Workplace and various clients for Windows…
Mobile Security Threat Intelligence3 Min Read September 9, 2025 RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication (NFC) relay attacks to a…
DDoS Vulnerabilities3 Min Read September 9, 2025 SAP Security Patch Day September 2025 – 21 Vulnerabilities and 4 Critical One’s Patched As part of its scheduled security maintenance, SAP released its September 2025 Patch Day notes, addressing a total of 21 new vulnerabilities…
Data Breach Vulnerabilities2 Min Read September 9, 2025 Magento and Adobe SessionReaper Vulnerability Exposes Thousands Of Online Stores to Attacks Adobe has issued an emergency security patch for a critical vulnerability in its Magento and Adobe Commerce platforms, dubbed…
Cloud Security Network Ransomware2 Min Read September 9, 2025 Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign A major data theft campaign targeting Salesforce data via the Salesloft Drift app began after threat actors compromised a key GitHub account,…
Linux Vulnerabilities2 Min Read September 9, 2025 New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability A new technique to exploit a complex use-after-free (UAF) vulnerability in the Linux kernel successfully bypasses modern security…
Supply Chain Attack2 Min Read September 8, 2025 GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies Salesloft has revealed that the data breach linked to its Drift application started with the compromise of its GitHub account. Google-owned…
Encryption Malvertising3 Min Read September 8, 2025 GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver…
Cloud Security Network3 Min Read September 8, 2025 Qualys, Tenable Latest Victims of Salesloft Drift Hack Cybersecurity providers Tenable and Qualys are the latest in a growing list of companies affected by a significant supply chain attack…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Threat Intelligence Vulnerability4 Min Read September 5, 2025 CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the…
Cryptocurrency Malware3 Min Read September 5, 2025 VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing…
Data Breach Malware4 Min Read September 4, 2025 GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to…
Uncategorized3 Min Read September 4, 2025 Google Fined $379 Million by French Regulator for Cookie Consent Violations The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (€325 million) and $175 million…
Mobile Security Vulnerability2 Min Read September 3, 2025 Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September…
Network Security Threat Intelligence4 Min Read September 3, 2025 Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service (DDoS) attack that peaked at…
Data Breach2 Min Read September 3, 2025 Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations Salesloft on Tuesday announced that it’s taking Drift temporarily offline “in the very near future,” as multiple companies…
Uncategorized4 Min Read September 2, 2025 Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The threat actor known as Silver Fox has been attributed to abuse of a previously unknown vulnerable driver associated with WatchDog…
Malvertising Mobile Security3 Min Read September 1, 2025 Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used…
Uncategorized19 Min Read September 1, 2025 ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update,…
Browser Security Threat Intelligence5 Min Read September 1, 2025 When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of…
Malware3 Min Read September 1, 2025 ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka…
Cloud Security DDoS Linux Ransomware Windows2 Min Read September 1, 2025 Another Ryzen 9000 CPU Burnout: What’s Really Going On? Ddos September 1, 2025 Earlier this year, reports emerged of Asrock motherboards paired with processors such as the 9800X3D suffering…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
DDoS Ransomware Vulnerabilities2 Min Read August 31, 2025 Meta’s New AI NPCs Will Make Horizon Worlds Come to Life Ddos August 31, 2025 Meta is once again infusing its metaverse platform, Horizon Worlds, with generative AI experiences, enabling developers…
Security3 Min Read August 30, 2025 TamperedChef infostealer delivered through fraudulent PDF Editor Threat actors have been using multiple websites promoted through Google ads to distribute a convincing PDF editing app that delivers an…
DDoS Vulnerabilities3 Min Read August 30, 2025 Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed A critical zero-day vulnerability in Citrix NetScaler products, identified as CVE-2025-6543, has been actively exploited by threat actors…
Apple Malware Vulnerabilities2 Min Read August 29, 2025 WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific…
Malware Threat Intelligence2 Min Read August 29, 2025 Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked…
Cyber Espionage Malware4 Min Read August 29, 2025 Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an…
Malware3 Min Read August 29, 2025 Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal…
Data Breach2 Min Read August 29, 2025 Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope than…
Malware3 Min Read August 29, 2025 TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites…
Security2 Min Read August 28, 2025 Google warns Salesloft breach impacted some Workspace accounts Google now reports that the Salesloft Drift breach is larger than initially thought, warning that attackers also used stolen OAuth tokens to…
Google2 Min Read August 28, 2025 Google shares workarounds for auth failures on ChromeOS devices Google is working to resolve authentication issues affecting some ChromeOS devices, which are preventing affected users from signing into…
Malware Ransomware3 Min Read August 28, 2025 Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of…
Cyber Espionage Network Security4 Min Read August 28, 2025 Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world,…