Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

18/11/2025 0 Comments 0 tags

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

17/11/2025 0 Comments 0 tags

Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT. The activity, observed this month, is being tracked by eSentire

5 Reasons Why Attackers Are Phishing Over LinkedIn

17/11/2025 0 Comments 0 tags

Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps.

⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

17/11/2025 0 Comments 0 tags

This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI,

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

17/11/2025 0 Comments 0 tags

The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a remote access trojan called Gh0st

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

17/11/2025 0 Comments 0 tags

Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling below 20% for the first

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

15/11/2025 0 Comments 0 tags

The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies

15/11/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

14/11/2025 0 Comments 0 tags

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. “The threat actors have recently

Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

14/11/2025 0 Comments 0 tags

The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a