Data Breach Linux Web Security3 Min Read September 22, 2025 JWT Warfare: Obfuscation, Cracking, and Red Team Exploits | Cyber Codex What is JWT?JWT (JSON Web Token) is a compact, URL-safe method of representing claims between two parties. It is used mostly in stateless…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Security4 Min Read September 21, 2025 Microsoft Entra ID flaw allowed hijacking any company's tenant A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.…
Malware Threat Intelligence7 Min Read September 21, 2025 DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
DDoS Malware Ransomware Vulnerabilities7 Min Read September 20, 2025 Top Zero-Day Vulnerabilities Exploited in the Wild in 2025 The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.…
Malware Software Security2 Min Read September 20, 2025 LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that…
Artificial Intelligence Cloud Security3 Min Read September 20, 2025 ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent Cybersecurity researchers have disclosed a zero-click flaw in OpenAI ChatGPT's Deep Research agent that could allow an attacker to leak…
Malware Ransomware Vulnerabilities Windows14 Min Read September 20, 2025 WannaCry Ransomware: A DFIR & SOC Monitoring Lab Walkthrough Hello fellow defenders, I hope you are having a great day. In this article, I’m going to show you how you can make a cybersecurity home…
Cyber Espionage Threat Intelligence5 Min Read September 19, 2025 UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies,…
Network Vulnerabilities2 Min Read September 19, 2025 Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication A critical authentication bypass vulnerability has emerged in Nokia’s CloudBand Infrastructure Software (CBIS) and Nokia Container…
Exploits Malware Ransomware Vulnerabilities3 Min Read September 19, 2025 CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding sophisticated malware campaigns targeting…
Data Breach Network Ransomware Vulnerabilities2 Min Read September 19, 2025 Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cybersecurity researchers have identified a potential connection between two Yemen-based cybercriminal organizations, the Belsen Group and…
Exploits Network Ransomware Vulnerabilities2 Min Read September 19, 2025 Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation A deserialization flaw in the License Servlet component of Fortra GoAnywhere Managed File Transfer (MFT) platform. Identified as…
Vulnerabilities2 Min Read September 19, 2025 HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks A newly disclosed flaw in HubSpot’s open-source Jinjava template engine could allow attackers to bypass sandbox restrictions and achieve…
Artificial Intelligence Technology1 Min Read September 18, 2025 ChatGPT Search is now smarter as OpenAI takes on Google Search OpenAI has rolled out a big update to ChatGPT Search, which is an AI-powered search feature, similar to Google AI Mode. After a recent update,…
Data Breach Ransomware Vulnerabilities Windows2 Min Read September 18, 2025 GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware The cyberthreat landscape has witnessed the emergence of another sophisticated ransomware operation as GOLD SALEM, a new threat actor group…
Linux Malware Vulnerabilities Windows2 Min Read September 18, 2025 Google pushes emergency patch for Chrome 0-day – check your browser version now Google pushed an emergency patch for a high-severity Chrome flaw, already under active exploitation. So it's time to make sure you're running…
Cloud Security Vulnerabilities Windows3 Min Read September 18, 2025 Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control A critical vulnerability in Microsoft’s Entra ID could have allowed an attacker to gain complete administrative control over any tenant…
Cybercrime Malware3 Min Read September 18, 2025 CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to…
Exploits Linux Vulnerabilities Windows1 Min Read September 18, 2025 Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its…
Apple Linux Vulnerabilities Windows3 Min Read September 18, 2025 Google Confirms Real-World Attacks on Chrome Vulnerability CVE-2025-10585 Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical…
Cloud Security Data Breach Network Ransomware2 Min Read September 18, 2025 SolarWinds Issues Advisory on Salesforce Data Breach Linked to Salesloft Drift SolarWinds has issued a security advisory regarding a major Salesforce data breach that exposed sensitive information from numerous companies…
Security2 Min Read September 18, 2025 Google patches sixth Chrome zero-day exploited in attacks this year Google has released emergency security updates to patch a Chrome zero-day vulnerability, the sixth one tagged as exploited in attacks since…
Browser Security Vulnerability2 Min Read September 18, 2025 Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
Data Breach Exploits Vulnerabilities Windows3 Min Read September 18, 2025 Phoenix (CVE-2025-6202): A New Rowhammer Attack Bypasses DDR5 Protections Researchers from ETH Zurich have unveiled Phoenix, a new Rowhammer attack that successfully bypasses in-DRAM mitigations in all tested SK…
Security3 Min Read September 17, 2025 ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft…
Exploits IoT Security Web Security Windows6 Min Read September 17, 2025 How LLMs can be compromised in 2025 | Kaspersky official blog Developers of LLM-powered public services and business applications are working hard to ensure the security of their products, but the…
Exploits Mobile Security Network Vulnerabilities2 Min Read September 17, 2025 Critical WatchGuard Vulnerability Allows Unauthenticated Attacker to Execute Arbitrary Code A critical vulnerability has been discovered in WatchGuard’s Firebox firewalls, which could allow a remote, unauthenticated attacker to…
Apple Exploits Linux Vulnerabilities2 Min Read September 17, 2025 Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad Apple has released iOS 16.7.12 and iPadOS 16.7.12 on September 15, 2025, delivering critical security updates to older-generation…
Cybercrime Threat Intelligence3 Min Read September 17, 2025 Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims Cybersecurity researchers have tied a fresh round of cyber attacks targeting financial services to the notorious cybercrime group known as…
Security2 Min Read September 16, 2025 Google nukes 224 Android malware apps behind massive ad fraud campaign A massive Android ad fraud operation dubbed "SlopAds" was disrupted after 224 malicious applications on Google Play were used to generate…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Security4 Min Read September 16, 2025 Self-propagating supply chain attack hits 187 npm packages Security researchers have identified at least 187 npm packages compromised in an ongoing supply chain attack, with a malicious…
Data Breach Ransomware0 Min Read September 16, 2025 Gucci and Alexander McQueen Hit by Customer Data Breach Luxury fashion brands Gucci, Alexander McQueen and Balenciaga have suffered a customer data breach, in another attack linked to the…
Ad Fraud Mobile Security2 Min Read September 16, 2025 SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228…
Security2 Min Read September 16, 2025 Jaguar Land Rover extends shutdown after cyberattack by another week Jaguar Land Rover (JLR) announced today that it will extend the production shutdown for another week, following a devastating cyberattack that…
Malware Social Engineering3 Min Read September 16, 2025 New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the…
Apple Linux Vulnerabilities Windows2 Min Read September 16, 2025 Chrome’s New Preloading is a Game-Changer Google has long experimented with prerendering technology in Chrome to accelerate page loading by rendering content in advance so that pages…
Linux2 Min Read September 16, 2025 China Accuses NVIDIA of Anti-Monopoly Violations China’s State Administration for Market Regulation (SAMR) issued a statement today declaring that NVIDIA’s $6.9 billion…