Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

09/05/2025 0 Comments 0 tags

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. “Disguised as developer

Beyond Vulnerability Management – Can You CVE What I CVE?

09/05/2025 0 Comments 0 tags

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

09/05/2025 0 Comments 0 tags

Google on Thursday announced it’s rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano,

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

09/05/2025 0 Comments 0 tags

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published today, said it uncovered

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

08/05/2025 0 Comments 0 tags

Cybersecurity researchers have exposed what they say is an “industrial-scale, global cryptocurrency phishing operation” engineered to steal digital assets from cryptocurrency wallets for several years. The campaign has been codenamed

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

08/05/2025 0 Comments 0 tags

SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code execution. The vulnerabilities are

Qilin Leads April 2025 Ransomware Spike with 45 Breaches Using NETXLOADER Malware

08/05/2025 0 Comments 0 tags

Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign

Security Tools Alone Don’t Protect You — Control Effectiveness Does

08/05/2025 0 Comments 0 tags

61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware

08/05/2025 0 Comments 0 tags

The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage campaign directed against government agencies and public institutions in Japan

Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

08/05/2025 0 Comments 0 tags

The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures. “LOSTKEYS is capable