AI Security Regulatory Compliance6 Min Read November 11, 2025 CISO's Expert Guide To AI Supply Chain Attacks AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Browser Security Enterprise Security4 Min Read November 10, 2025 New Browser Security Report Reveals Emerging Threats for Enterprises According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in…
Malware Supply Chain Attack3 Min Read November 7, 2025 Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and…
Malware Supply Chain Attack3 Min Read November 7, 2025 Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to…
Compliance Threat Intelligence5 Min Read November 6, 2025 From Tabletop to Turnkey: Building Cyber Resilience in Financial Services Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational…
United States3 Min Read November 6, 2025 Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response…
Supply Chain Security Vulnerability2 Min Read November 4, 2025 Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks Details have emerged about a now-patched critical security flaw in the popular "@react-native-community/cli" npm package that could be…
Cybercrime Threat Detection8 Min Read November 4, 2025 Ransomware Defense Using the Wazuh Open Source Platform Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one…
Cybercrime Supply Chain Attack2 Min Read November 3, 2025 Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Browser Security Malware3 Min Read October 31, 2025 Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain…
Malware Secure Coding2 Min Read October 31, 2025 Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were…
Cybersecurity Hacking News12 Min Read October 30, 2025 ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact…
DevSecOps Software Security2 Min Read October 30, 2025 PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100…
Artificial Intelligence Vulnerability3 Min Read October 27, 2025 New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands Cybersecurity researchers have discovered a new vulnerability in OpenAI's ChatGPT Atlas web browser that could allow malicious actors to…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
DevOps Malware3 Min Read October 24, 2025 Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX…
Cybersecurity Hacking News3 Min Read October 23, 2025 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse…
Cryptocurrency Software Integrity1 Min Read October 22, 2025 Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum,…
Browser Security Malware2 Min Read October 20, 2025 131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for…
Blockchain Malware3 Min Read October 17, 2025 North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its…
Data Breach Ransomware Supply Chain2 Min Read October 16, 2025 Over 23 Million Victims Hit by Data Breaches in Q3 The number of US corporate data breaches and downstream victims appeared to slow in the third quarter of the year, according to new data from…
Botnets Cloud Security Ransomware Vulnerabilities3 Min Read October 16, 2025 F5 Reveals Nation State Breach and Urges Immediate Patching The US government has urged federal agencies to take immediate action after security vendor F5 revealed it has been breached by a nation-state…
Malware Ransomware Supply Chain Vulnerabilities2 Min Read October 16, 2025 CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe code execution vulnerability in…
Apple APT Groups IoT Security Vulnerabilities2 Min Read October 16, 2025 Apple Planning $350 Smart Display (2026) and Robotic Desktop Device (2027), Manufactured in Vietnam According to a report by Bloomberg News, Apple is actively expanding its smart home product line, with plans to launch a smart display…
Security2 Min Read October 15, 2025 F5 releases BIG-IP patches for stolen security vulnerabilities Cybersecurity company F5 has released security updates to address BIG-IP vulnerabilities stolen in a breach detected on August 9, 2025. The…
Cyber Espionage Threat Intelligence3 Min Read October 15, 2025 Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the…
Malware Software Supply Chain3 Min Read October 15, 2025 Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by…
Security2 Min Read October 15, 2025 F5 says hackers stole undisclosed BIG-IP flaws, source code U.S. cybersecurity company F5 disclosed that nation-state hackers breached its systems and stole undisclosed BIG-IP security…
Android Apple Data Breach Vulnerabilities2 Min Read October 15, 2025 Samsung Sets Oct 21 Event to Unveil “Project Moohan,” Its Android XR Headset Rival to Vision Pro Samsung data breach Samsung has announced that it will host a new product unveiling event titled “Worlds Wide Open” on October 21…
Exploits Network Supply Chain Vulnerabilities2 Min Read October 14, 2025 FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process Fortinet has issued an urgent advisory revealing a critical weakness in its FortiPAM and FortiSwitch Manager products that could allow…
DDoS Malware Ransomware Vulnerabilities9 Min Read October 14, 2025 Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Microsoft rolled out its October 2025 Patch Tuesday updates, addressing a staggering 172 vulnerabilities across its ecosystem, including four…
Malware Ransomware Vulnerabilities Windows3 Min Read October 14, 2025 UEFI Shell Vulnerabilities Could Let Hackers Bypass Secure Boot on 200,000+ Laptops Hackers can exploit vulnerabilities in signed UEFI shells to bypass Secure Boot protections on over 200,000 Framework laptops and desktops.…
Ransomware Supply Chain4 Min Read October 14, 2025 Senior Execs Falling Short on Cyber-Attack Preparedness, NCSC Warns Senior executives must do better to prepare for almost inevitable future cyber-attacks and cannot rely on government alone for protection, the…
Malware Typosquatting3 Min Read October 14, 2025 npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a…
Data Breach Supply Chain Vulnerabilities2 Min Read October 14, 2025 Critical Supply Chain Flaw: Clevo UEFI Firmware Leaked Intel Boot Guard Private Keys (CVE-2025-11577) The CERT Coordination Center (CERT/CC) has issued a warning regarding a critical supply chain — CVE-2025-11577 — after researchers…
Cloud Security Exploits Malware Vulnerabilities3 Min Read October 14, 2025 Stealth C2: Hackers Abuse Discord Webhooks for Covert Data Exfiltration in npm, PyPI, and RubyGems Supply Chain Attacks The Socket Threat Research Team has uncovered a growing trend among malicious package developers: leveraging Discord webhooks as…
Apple Ransomware Supply Chain2 Min Read October 14, 2025 iPhone Fold Hinge Costs Drop to $70-$80, Boosting Viability for Mass Production in 2026 The long-rumored foldable iPhone — tentatively referred to as the iPhone Fold — has yet to be officially announced, but numerous…
Threat Detection Web Security5 Min Read October 13, 2025 Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal…
Data Breach Exploits Supply Chain Vulnerabilities2 Min Read October 12, 2025 Critical Vulnerability CVE-2025-61884 Found in Oracle E-Business Suite Oracle E-Business Suite (EBS) — a cornerstone ERP platform for countless enterprises across the globe — faces a critical security…
Supply Chain Vulnerabilities2 Min Read October 11, 2025 China Launches Antitrust Probe into Qualcomm Over Autotalks Acquisition Failure to File Declaration China’s State Administration for Market Regulation (SAMR) recently announced the launch of an antitrust investigation into U.S.…