Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

17/11/2025 0 Comments 0 tags

Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling below 20% for the first

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

15/11/2025 0 Comments 0 tags

The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies

15/11/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

14/11/2025 0 Comments 0 tags

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. “The threat actors have recently

Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

14/11/2025 0 Comments 0 tags

The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

14/11/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

14/11/2025 0 Comments 0 tags

Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date. 1,590 victims disclosed across 85 leak sites, showing high, sustained

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

14/11/2025 0 Comments 0 tags

State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a “highly sophisticated espionage campaign” in mid-September 2025. “The

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch

14/11/2025 0 Comments 0 tags

Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise a device.

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

13/11/2025 0 Comments 0 tags

A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year. The activity, per Netcraft security researcher Andrew Brandt,