Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

10/01/2025 0 Comments 0 tags

Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution. The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score:

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

10/01/2025 0 Comments 0 tags

Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption

09/01/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. “Once thought dormant after its source code leak in late 2024, this new iteration

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection

09/01/2025 0 Comments 0 tags

Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan

09/01/2025 0 Comments 0 tags

Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions

09/01/2025 0 Comments 0 tags

Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A

Product Review: How Reco Discovers Shadow AI in SaaS

09/01/2025 0 Comments 0 tags

As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI.  Shadow AI

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

09/01/2025 0 Comments 0 tags

The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the

Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure

09/01/2025 0 Comments 0 tags

Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning mid-December 2024. The security

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections

08/01/2025 0 Comments 0 tags

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email