Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

25/11/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. “This ongoing operation, active for at

3 SOC Challenges You Need to Solve Before 2026

25/11/2025 0 Comments 0 tags

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

25/11/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

24/11/2025 0 Comments 0 tags

Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects “allow

⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

24/11/2025 0 Comments 0 tags

This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

24/11/2025 0 Comments 0 tags

Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack. The new supply chain

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

24/11/2025 0 Comments 0 tags

New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed politically sensitive by China.

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

24/11/2025 0 Comments 0 tags

A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

22/11/2025 0 Comments 0 tags

The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

22/11/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active