Why Data Security and Privacy Need to Start in Code

16/12/2025 0 Comments 0 tags

AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

16/12/2025 0 Comments 0 tags

Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed active

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

16/12/2025 0 Comments 0 tags

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and

Google to Shut Down Dark Web Monitoring Tool in February 2026

16/12/2025 0 Comments 0 tags

Google has announced that it’s discontinuing its dark web report tool in February 2026, less than two years after it was launched as a way for users to monitor if

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

15/12/2025 0 Comments 0 tags

A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered by users into artificial intelligence (AI)-powered chatbots like OpenAI ChatGPT,

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

15/12/2025 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical flaw that could result in an authentication bypass under certain configurations. The

A Browser Extension Risk Guide After the ShadyPanda Campaign

15/12/2025 0 Comments 0 tags

In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser extensions on a massive scale. A threat group dubbed ShadyPanda spent

⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

15/12/2025 0 Comments 0 tags

If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently exploiting critical flaws in the daily

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

15/12/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious ISO optical

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

15/12/2025 0 Comments 0 tags

The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test artifacts, allowing users to