Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure

30/07/2025 0 Comments 0 tags

Google Cloud’s Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of

Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44

29/07/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a now-patched critical security flaw in a popular vibe coding platform called Base44 that could allow unauthorized access to private applications built by its users. “The

PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain

29/07/2025 0 Comments 0 tags

The maintainers of the Python Package Index (PyPI) repository have issued a warning about an ongoing phishing attack that’s targeting users in an attempt to redirect them to fake PyPI

Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

29/07/2025 0 Comments 0 tags

A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter’s dark web infrastructure has been the subject of

Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks

29/07/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that’s targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive

Why React Didn’t Kill XSS: The New JavaScript Injection Playbook

29/07/2025 0 Comments 0 tags

React conquered XSS? Think again. That’s the reality facing JavaScript developers in 2025, where attackers have quietly evolved their injection techniques to exploit everything from prototype pollution to AI-generated code,

How the Browser Became the Main Cyber Battleground

29/07/2025 0 Comments 0 tags

Until recently, the cyber attacker methodology behind the biggest breaches of the last decade or so has been pretty consistent: Compromise an endpoint via software exploit, or social engineering a

CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation

29/07/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-severity security vulnerability impacting PaperCutNG/MF print management software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads

28/07/2025 0 Comments 0 tags

In what’s the latest instance of a software supply chain attack, unknown threat actors managed to compromise Toptal’s GitHub organization account and leveraged that access to publish 10 malicious packages

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

28/07/2025 0 Comments 0 tags

Some risks don’t breach the perimeter—they arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight. This week, the clearest threats weren’t the loudest—they were the