⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

19 min read
admin
June 2, 2025
If this had been a security drill, someone would’ve said it went too far. But it wasn’t...
admin
June 2, 2025
Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as...
admin
June 2, 2025
Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that...
admin
June 2, 2025
Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in...
admin
June 2, 2025
Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called...
admin
June 2, 2025
The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As...
admin
May 31, 2025
Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu,...
admin
May 31, 2025
A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered...
admin
May 30, 2025
A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix...
admin
May 30, 2025
The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver...
admin
May 30, 2025
Breaking Out of the Security Mosh Pit
When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare...
admin
May 30, 2025
The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based...
admin
May 30, 2025
ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim...
admin
May 30, 2025
Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania...
admin
May 29, 2025
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used...
admin
May 29, 2025
Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS...
admin
May 29, 2025
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called...
admin
May 29, 2025
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp...
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

2 min read
admin
May 29, 2025
Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that...
admin
May 28, 2025
Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster...