Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

26/08/2025 0 Comments 0 tags

Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android will

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

25/08/2025 0 Comments 0 tags

Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

25/08/2025 0 Comments 0 tags

A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

25/08/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver

⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

25/08/2025 0 Comments 0 tags

Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand.

Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

25/08/2025 0 Comments 0 tags

Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time.

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

25/08/2025 0 Comments 0 tags

The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

24/08/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. “On the

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

23/08/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

22/08/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The “Linux-specific malware infection chain that starts with a