Cybersecurity Hacking News12 Min Read December 4, 2025 ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and…
Data Privacy Web Security6 Min Read December 4, 2025 5 Threats That Reshaped Web Security This Year [2025] As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become dangerously…
machine learning Vulnerability3 Min Read December 3, 2025 Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute…
Blockchain Malware2 Min Read December 2, 2025 GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open…
Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Malware Vulnerability3 Min Read November 28, 2025 Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain…
Malware Supply Chain4 Min Read November 26, 2025 Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the…
Data Breach Ransomware4 Min Read November 26, 2025 Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist South Korea's financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment…
Cloud Security Vulnerability3 Min Read November 24, 2025 Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of…
Cybersecurity Hacking News14 Min Read November 24, 2025 ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS…
Malware Threat Intelligence5 Min Read November 21, 2025 APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…
Compliance Cyber Attack2 Min Read November 21, 2025 SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer,…
Cybersecurity Hacking News11 Min Read November 20, 2025 ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work,…
Cyber Espionage Malware3 Min Read November 19, 2025 EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to…
Cyber Espionage Malware3 Min Read November 18, 2025 Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued…
Malware Web Security2 Min Read November 18, 2025 Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Malware Software Supply Chain6 Min Read November 13, 2025 Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake…
AI Security Regulatory Compliance6 Min Read November 11, 2025 CISO's Expert Guide To AI Supply Chain Attacks AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Browser Security Enterprise Security4 Min Read November 10, 2025 New Browser Security Report Reveals Emerging Threats for Enterprises According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in…
Malware Supply Chain Attack3 Min Read November 7, 2025 Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and…
Malware Supply Chain Attack3 Min Read November 7, 2025 Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to…
Compliance Threat Intelligence5 Min Read November 6, 2025 From Tabletop to Turnkey: Building Cyber Resilience in Financial Services Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational…
United States3 Min Read November 6, 2025 Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response…
Supply Chain Security Vulnerability2 Min Read November 4, 2025 Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks Details have emerged about a now-patched critical security flaw in the popular "@react-native-community/cli" npm package that could be…
Cybercrime Threat Detection8 Min Read November 4, 2025 Ransomware Defense Using the Wazuh Open Source Platform Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one…
Cybercrime Supply Chain Attack2 Min Read November 3, 2025 Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Browser Security Malware3 Min Read October 31, 2025 Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain…
Malware Secure Coding2 Min Read October 31, 2025 Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were…
Cybersecurity Hacking News12 Min Read October 30, 2025 ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact…
DevSecOps Software Security2 Min Read October 30, 2025 PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100…
Artificial Intelligence Vulnerability3 Min Read October 27, 2025 New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands Cybersecurity researchers have discovered a new vulnerability in OpenAI's ChatGPT Atlas web browser that could allow malicious actors to…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
DevOps Malware3 Min Read October 24, 2025 Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX…
Cybersecurity Hacking News3 Min Read October 23, 2025 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse…
Cryptocurrency Software Integrity1 Min Read October 22, 2025 Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum,…
Browser Security Malware2 Min Read October 20, 2025 131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for…
Blockchain Malware3 Min Read October 17, 2025 North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its…
Data Breach Ransomware Supply Chain2 Min Read October 16, 2025 Over 23 Million Victims Hit by Data Breaches in Q3 The number of US corporate data breaches and downstream victims appeared to slow in the third quarter of the year, according to new data from…