ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

12/05/2025 0 Comments 0 tags

ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in order to achieve remote code

⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

12/05/2025 0 Comments 0 tags

What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks—because cybercriminals are rethinking what counts as “infrastructure.” Instead

The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

12/05/2025 0 Comments 0 tags

Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after detection. New research from GitGuardian’s State of Secrets Sprawl

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

12/05/2025 0 Comments 0 tags

Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users into downloading an information stealer malware dubbed Noodlophile. “Instead of relying on traditional

Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

10/05/2025 0 Comments 0 tags

Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that accused the company of tracking users’ personal location and maintaining their facial

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

10/05/2025 0 Comments 0 tags

Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked to the eXch cryptocurrency exchange over allegations of money laundering and operating a

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation

09/05/2025 0 Comments 0 tags

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s powered by thousands of infected Internet of Things (IoT) and end-of-life (EoL)

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

09/05/2025 0 Comments 0 tags

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

09/05/2025 0 Comments 0 tags

Cybersecurity researchers are warning of a new campaign that’s targeting Portuguese-speaking users in Brazil with trial versions of commercial remote monitoring and management (RMM) software since January 2025. “The spam

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

09/05/2025 0 Comments 0 tags

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks — like data leaks,