Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

10/06/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data to unauthorized internal and external parties. The weaknesses affect various components like

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

10/06/2025 0 Comments 0 tags

The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs. “By posing

Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

10/06/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent gaming websites. “Upon execution, the malware displays a fake window

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

10/06/2025 0 Comments 0 tags

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is

Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account

10/06/2025 0 Comments 0 tags

Google has stepped in to address a security flaw that could have made it possible to brute-force an account’s recovery phone number, potentially exposing them to privacy and security risks.

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises

10/06/2025 0 Comments 0 tags

The threat actor known as Rare Werewolf (formerly Rare Wolf) has been linked to a series of cyber attacks targeting Russia and the Commonwealth of Independent States (CIS) countries. “A

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

10/06/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV) catalog,

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

09/06/2025 0 Comments 0 tags

The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions into several targets between July 2024 and March 2025. “The victimology includes a

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

09/06/2025 0 Comments 0 tags

A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai botnet variants and use them to conduct distributed denial-of-service (DDoS)

⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

09/06/2025 0 Comments 0 tags

Behind every security alert is a bigger story. Sometimes it’s a system being tested. Sometimes it’s trust being lost in quiet ways—through delays, odd behavior, or subtle gaps in control.