Malware Phishing Ransomware Vulnerabilities2 Min Read October 3, 2025 Google Announces $4 Billion Arkansas Investment for New AI Data Center and 600 MW Solar Project Google has announced plans to invest up to $4 billion in Arkansas by 2027, channeling resources into infrastructure, energy transition, and…
Cloud Security Data Breach Ransomware1 Min Read October 2, 2025 Extortion Emails Sent to Executives by Self-Proclaimed Clop Gang Member An individual or group of people claiming to be working with the Clop ransomware has been sending extortion emails to executives at several…
Cyber Espionage Malware2 Min Read October 2, 2025 Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like…
AI Artificial Intelligence Cybersecurity Gemini AI Gemini Trifecta Google Security Vulnerability2 Min Read October 2, 2025 Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Ransomware Threat Intelligence2 Min Read October 2, 2025 Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to…
Security3 Min Read October 2, 2025 Android spyware campaigns impersonate Signal and ToTok messengers Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok…
Malware Mobile Security4 Min Read October 2, 2025 Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…
Linux Vulnerabilities Windows2 Min Read October 2, 2025 Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser Google has released Chrome 141 to address 21 security vulnerabilities, including critical flaws that could allow attackers to crash browsers…
DDoS Phishing Vulnerabilities Web Security3 Min Read October 2, 2025 Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers to…
Security3 Min Read October 2, 2025 Clop extortion emails claim theft of Oracle E-Business Suite data Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data…
Mobile Security3 Min Read October 1, 2025 Android malware uses VNC to give attackers hands-on access A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000…
Google Mobile Security3 Min Read October 1, 2025 F-Droid project threatened by Google's new dev registration rules F-Droid is warning that the project could reach an end due to Google’s new requirements for all Android developers to verify their…
Artificial Intelligence Google Security2 Min Read October 1, 2025 Google Drive for desktop gets AI-powered ransomware detection Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it…
Apple Botnets Network Vulnerabilities2 Min Read October 1, 2025 CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports…
Exploits Linux Vulnerabilities2 Min Read October 1, 2025 Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…
DDoS Exploits Vulnerabilities3 Min Read October 1, 2025 OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to…
Legal2 Min Read September 30, 2025 Sendit sued by the FTC for illegal collection of children data The Federal Trade Commission (FTC) is suing Sendit's operating company and its CEO for unlawful collection of data from underage users, as…
Encryption Hardware Security4 Min Read September 30, 2025 $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the…
Exploits Nation-state Vulnerabilities Windows2 Min Read September 30, 2025 Chinese hackers exploiting VMware zero-day since October 2024 Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has…
Exploits Linux Ransomware Vulnerabilities2 Min Read September 30, 2025 CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks CISA has issued an urgent advisory regarding a critical vulnerability in the Linux and Unix sudo utility CVE-2025-32463 that is currently…
Phishing Ransomware Vulnerabilities Windows2 Min Read September 30, 2025 Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web Veeam Backup & Replication, a cornerstone of many enterprises’ data protection strategy, has reportedly become the focus of a new…
Exploits Network Ransomware Vulnerabilities2 Min Read September 30, 2025 Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Security researchers are observing a significant increase in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability…
Artificial Intelligence Vulnerability3 Min Read September 30, 2025 Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits Cybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Google's Gemini artificial intelligence (AI)…
Cloud Security Phishing3 Min Read September 30, 2025 Gemini Trifecta Highlights Dangers of Indirect Prompt Injection Network defenders must start treating AI integrations as active threat surfaces, experts have warned after revealing three new vulnerabilities…
Vulnerability Zero-Day1 Min Read September 30, 2025 Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since…
Cybercrime Mobile Security4 Min Read September 30, 2025 New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO)…
Linux Vulnerability2 Min Read September 30, 2025 CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data A sophisticated malware campaign has emerged that weaponizes seemingly legitimate productivity tools to infiltrate systems and steal sensitive…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
Apple Exploits Malware Vulnerabilities2 Min Read September 29, 2025 WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File WhatsApp 0-click remote code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of…
DDoS Exploits Ransomware Vulnerabilities2 Min Read September 29, 2025 SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account A critical flaw in SUSE Rancher’s user management module allows privileged users to disrupt administrative access by modifying usernames…
Apple DDoS Exploits3 Min Read September 29, 2025 Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework Google Project Zero has revealed a new technique capable of bypassing Address Space Layout Randomization (ASLR) protections on Apple devices.…
Network Ransomware Vulnerabilities2 Min Read September 29, 2025 SonicWall SSL VPN Attacks Escalate, Bypassing MFA Security experts have warned of a surge in malicious activity from Akira ransomware actors targeted at victims running SonicWall SSL VPN…
Malware Network Ransomware Vulnerabilities10 Min Read September 29, 2025 Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild The cybersecurity landscape experienced a significant escalation in September 2025, when Cisco disclosed multiple critical zero-day…
Exploits Vulnerabilities3 Min Read September 29, 2025 Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization A critical security flaw discovered in Formbricks, an open-source experience management platform, demonstrates how missing JWT signature…
Malware Phishing Ransomware Vulnerabilities3 Min Read September 29, 2025 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code…
Windows1 Min Read September 29, 2025 Microsoft May Finally Let Windows Search Results Open in Your Default Browser At present, in Windows 11, online search results from the search panel are forcibly opened in Microsoft Edge, regardless of whether users have…
Data Breach DDoS Phishing Vulnerabilities2 Min Read September 29, 2025 SUSE Rancher Security Team Patches Three Vulnerabilities in Rancher Manager The SUSE Rancher Team has issued fixes for three affecting Rancher Manager, with severities ranging from Medium to High. These could lead to…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 TamperedChef Malware Rises: Deceptive Apps Use Signed Binaries and SEO Poisoning to Hijack Browsers Field Effect’s Threat Intelligence team has uncovered a new wave of the TamperedChef malware campaign, leveraging digitally signed…
Malware Ransomware Vulnerabilities Windows3 Min Read September 29, 2025 RedNovember: Chinese APT Expands Global Espionage to U.S. Defense, Aerospace, and Tech Firms A new report from Recorded Future’s Insikt Group reveals that the Chinese state-sponsored threat group RedNovember has significantly…