Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence

06/05/2025 0 Comments 0 tags

A recently disclosed critical security flaw impacting the open-source Langflow platform has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA),

Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

06/05/2025 0 Comments 0 tags

Google has released its monthly security updates for Android with fixes for 46 security flaws, including one vulnerability that it said has been exploited in the wild. The vulnerability in

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed

05/05/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command Center to its Known Exploited Vulnerabilities (KEV) catalog, a little over a week

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi

05/05/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple’s AirPlay protocol that, if successfully exploited, could enable an attacker to take over susceptible devices supporting the proprietary

Perfection is a Myth. Leverage Isn’t: How Small Teams Can Secure Their Google Workspace

05/05/2025 0 Comments 0 tags

Let’s be honest: if you’re one of the first (or the first) security hires at a small or midsize business, chances are you’re also the unofficial CISO, SOC, IT Help

⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors

05/05/2025 0 Comments 0 tags

What if attackers aren’t breaking in—they’re already inside, watching, and adapting? This week showed a sharp rise in stealth tactics built for long-term access and silent control. AI is being

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

05/05/2025 0 Comments 0 tags

The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and TerraLogger, suggesting continued development efforts to fine-tune and diversify their arsenal. “TerraStealerV2

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

03/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system’s primary disk and render it unbootable. The

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

03/05/2025 0 Comments 0 tags

An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. The

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

03/05/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and hospitals