Android Apple Data Breach Vulnerabilities2 Min Read October 15, 2025 Samsung Sets Oct 21 Event to Unveil “Project Moohan,” Its Android XR Headset Rival to Vision Pro Samsung data breach Samsung has announced that it will host a new product unveiling event titled “Worlds Wide Open” on October 21…
Phishing Ransomware Vulnerabilities Windows1 Min Read October 15, 2025 Chrome Fix: New Use-After-Free Flaw (CVE-2025-11756) in Safe Browsing Component Poses High Risk Google has released a new Stable Channel Update for Desktop, rolling out gradually to Windows, macOS, and Linux systems over the coming days…
Apple Malware Ransomware Vulnerabilities4 Min Read October 15, 2025 Sekoia Exposes PolarEdge Backdoor: Custom mbedTLS C2 Compromising Cisco, QNAP, and Synology Devices Sekoia Threat Detection & Response (TDR) researchers have published an in-depth technical analysis of the PolarEdge Backdoor, a stealthy…
Malware Network Ransomware Vulnerabilities2 Min Read October 14, 2025 PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication A sophisticated backdoor malware targeting Internet of Things devices has surfaced, employing advanced communication techniques to maintain…
Mobile Security3 Min Read October 14, 2025 New Android Pixnapping attack steals MFA codes pixel-by-pixel A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels…
Exploits Network Supply Chain Vulnerabilities2 Min Read October 14, 2025 FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process Fortinet has issued an urgent advisory revealing a critical weakness in its FortiPAM and FortiSwitch Manager products that could allow…
Exploits Network Vulnerabilities1 Min Read October 14, 2025 FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October 14, 2025, that could enable local authenticated…
DDoS Malware Ransomware Vulnerabilities9 Min Read October 14, 2025 Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Microsoft rolled out its October 2025 Patch Tuesday updates, addressing a staggering 172 vulnerabilities across its ecosystem, including four…
Security4 Min Read October 14, 2025 Oracles silently fixes zero-day exploit leaked by ShinyHunters Oracle has silently fixed an Oracle E-Business Suite vulnerability (CVE-2025-61884) that was actively exploited to breach servers, with a…
Malware Ransomware Vulnerabilities Windows3 Min Read October 14, 2025 UEFI Shell Vulnerabilities Could Let Hackers Bypass Secure Boot on 200,000+ Laptops Hackers can exploit vulnerabilities in signed UEFI shells to bypass Secure Boot protections on over 200,000 Framework laptops and desktops.…
Android Phishing Vulnerabilities Windows2 Min Read October 14, 2025 New Pixnapping Attack Steals 2FA Codes From Google Authenticator Within 30 Seconds Pixnapping, a novel class of side-channel attacks targeting Android devices that can covertly extract sensitive screen data, including…
Mobile Security Vulnerability3 Min Read October 14, 2025 New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal…
Apple2 Min Read October 14, 2025 Apple Hit with Second Lawsuit Alleging AI Training Used Pirated Books from “Shadow Libraries” After previously being accused of using pirated books to train its artificial intelligence models, Apple now faces yet another class-action…
Exploits Phishing Vulnerabilities Windows2 Min Read October 14, 2025 Microsoft Patches Edge IE Mode After Hackers Exploited Chakra Zero-Day for Device Takeover After discovering that hackers were exploiting a zero-day in the Chakra JavaScript engine used by Internet Explorer versions 9, 10, and 11,…
Apple Ransomware Supply Chain2 Min Read October 14, 2025 iPhone Fold Hinge Costs Drop to $70-$80, Boosting Viability for Mass Production in 2026 The long-rumored foldable iPhone — tentatively referred to as the iPhone Fold — has yet to be officially announced, but numerous…
Apple Malware Ransomware Windows2 Min Read October 13, 2025 New Stealit Malware Campaign Spreads via VPN and Game Installer Apps Threat actors are conducting a new malicious campaign deploying the Stealit malware via disguised applications, according to Fortinet. The…
Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Security2 Min Read October 13, 2025 Harvard investigating breach linked to Oracle zero-day exploit Harvard University is investigating a data breach after the Clop ransomware gang listed the school on its data leak site, saying the alleged…
Cloud Security Malware Ransomware Vulnerabilities2 Min Read October 13, 2025 Apple Bug Bounty Payouts Can Now Top $5m Apple has doubled its top award for ethical hacking discoveries to $2m, although security researchers could earn even more if they’re…
Data Breach Ransomware3 Min Read October 13, 2025 FBI and French Police Shutter BreachForums Domain Again The FBI and French investigators have seized at least one domain for a popular cybercrime forum being used as a leak site in connection with…
Financial Security Malware2 Min Read October 13, 2025 Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Supply Chain Vulnerabilities2 Min Read October 11, 2025 China Launches Antitrust Probe into Qualcomm Over Autotalks Acquisition Failure to File Declaration China’s State Administration for Market Regulation (SAMR) recently announced the launch of an antitrust investigation into U.S.…
Google2 Min Read October 10, 2025 Google Chrome to revoke notification access for inactive sites Google is updating the Chrome web browser to automatically revoke notification permissions for websites that haven't been visited recently, to…
Exploits Network Ransomware Vulnerabilities2 Min Read October 10, 2025 Zero-day in file-sharing software leads to RCE, and attacks are ongoing Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
Microsoft2 Min Read October 10, 2025 Copilot on Windows can now connect to email, create Office docs Microsoft has upgraded its AI-powered Copilot digital assistant to generate Office documents and to connect to Outlook and Gmail email…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide…
Phishing2 Min Read October 10, 2025 Google Launches AI Bug Bounty with $30,000 Top Reward Google has launched a new AI Vulnerability Reward Program (VRP), which is offering base rewards of up to $30,000 for bugs identified in the…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
Malware Phishing Ransomware Windows4 Min Read October 10, 2025 ‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
Legal Security3 Min Read October 10, 2025 FBI takes down BreachForums portal used for Salesforce extortion The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as a portal for leaking…
Exploits Vulnerabilities2 Min Read October 10, 2025 Gladinet CentreStack And Triofox 0-Day RCE Vulnerability Actively Exploited In Attacks An active in-the-wild exploitation of a zero-day vulnerability in Gladinet CentreStack and Triofox products. Tracked as CVE-2025-11371, the…
Data Breach Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day The cybersecurity landscape faces a new and significant threat as the notorious CL0P ransomware group has launched a large-scale extortion…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Apple Vulnerabilities Windows4 Min Read October 10, 2025 October 2025 Patch Tuesday forecast: The end of a decade with Microsoft A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after…
Android Ransomware Vulnerabilities2 Min Read October 10, 2025 Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders For certain advanced users and developers, unlocking the Android operating system on their smartphones is a common practice. Once unlocked, it…
Data Breach Malware Ransomware Vulnerabilities4 Min Read October 10, 2025 CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882) Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
Cloud Security DDoS Vulnerabilities Windows2 Min Read October 10, 2025 NVIDIA GPU Driver Patches Multiple High-Severity Flaws Risking RCE and Privilege Escalation NVIDIA has released an important software update for its GPU Display Driver, addressing multiple that could lead to code execution, privilege…
Mobile Security3 Min Read October 9, 2025 New Android spyware ClayRat imitates WhatsApp, TikTok, YouTube A new Android spyware called ClayRat is luring potential victims by posing as popular apps and services like WhatsApp, Google Photos, TikTok,…
Malware Mobile Security3 Min Read October 9, 2025 New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike…