Exploits Linux Vulnerabilities2 Min Read September 18, 2025 From Simple Bug to RCE: A Flaw (CVE-2025-21692) in the Linux Kernel, PoC Published Security researcher Volticks has published a deep technical writeup on CVE-2025-21692, a vulnerability in the Linux kernel’s Enhanced…
Exploits Malware Phishing Windows0 Min Read September 17, 2025 FileFix Campaign Using Steganography and Multistage Payloads A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted…
Malware Social Engineering3 Min Read September 16, 2025 New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the…
Security3 Min Read September 16, 2025 New FileFix attack uses steganography to drop StealC malware A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing…
Security3 Min Read September 15, 2025 New Phoenix attack bypasses Rowhammer defenses in DDR5 memory Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Exploits Vulnerabilities2 Min Read September 15, 2025 CVE-2025-58434: Critical FlowiseAI Flaw Enables Full Account Takeover A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk of…
Data Breach Exploits Network Vulnerabilities2 Min Read September 15, 2025 PoC Available: FlowiseAI Flaw (CVE-2025-58434) Allows Full Account Takeover (CVSS 9.8) The open-source generative AI development platform FlowiseAI, widely used for building AI agents and LLM workflows, has been found vulnerable…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
DDoS Malware Ransomware Vulnerabilities1 Min Read September 12, 2025 Apple Issues New Spyware Alerts for French Officials and Journalists Ddos September 12, 2025 Apple occasionally issues spyware attack notifications, publicly disclosing on its website which countries or regions…
Data Breach DDoS Vulnerabilities Windows2 Min Read September 12, 2025 CVE-2025-10127 (CVSS 9.8): Critical Daikin Flaw Could Give Hackers Full System Access Ddos September 12, 2025 The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory about a critical flaw in…
DDoS Exploits Phishing Vulnerabilities2 Min Read September 12, 2025 CVE-2025-58754: Axios Vulnerability Puts Node.js Processes at Risk of DoS Attacks Ddos September 12, 2025 The Axios project has released a security advisory for a newly discovered vulnerability affecting its popular…
Cloud Security Exploits Vulnerabilities Web Security5 Min Read August 26, 2025 CVE-2025-52882: WebSocket authentication bypass in Claude Code extensions A critical vulnerability in Claude Code for Visual Studio Code (VS Code) and other IDE extensions allowed malicious websites to connect to…
Exploits Web Security7 Min Read August 21, 2025 MCP vulnerability case study: SQL injection in the Postgres MCP server Key points and observations We found a SQL injection vulnerability in Anthropic’s reference Postgres MCP server that allowed us to…
IoT Research Whitepapers4 Min Read July 30, 2025 Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Whitepapers IoT Research min read Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Bitdefender July 30, 2025 Promo Protect all your…
Cloud Security Malware Ransomware Vulnerabilities24 Min Read July 16, 2025 I SPy: Escalating to Entra ID's Global Admin with a first-party app This research was presented at fwd:cloudsec North America on June 30th, 2025. You can find the talk here. Key points Service principals (SPs)…
Apple Linux Vulnerabilities Windows4 Min Read July 10, 2025 CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems Update - July 11, 2025: We are making a correction to the Git CLI versions vulnerable to this based on updates to the GitHub advisory around…