Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

30/07/2025 0 Comments 0 tags

Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser

Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero

30/07/2025 0 Comments 0 tags

Google has announced that it’s making a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks. DBSC,

Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

30/07/2025 0 Comments 0 tags

Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack targeting a U.S.-based chemicals company in April 2025. “Over the

Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure

30/07/2025 0 Comments 0 tags

Google Cloud’s Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of

PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain

29/07/2025 0 Comments 0 tags

The maintainers of the Python Package Index (PyPI) repository have issued a warning about an ongoing phishing attack that’s targeting users in an attempt to redirect them to fake PyPI

Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44

29/07/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a now-patched critical security flaw in a popular vibe coding platform called Base44 that could allow unauthorized access to private applications built by its users. “The

Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

29/07/2025 0 Comments 0 tags

A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter’s dark web infrastructure has been the subject of

How the Browser Became the Main Cyber Battleground

29/07/2025 0 Comments 0 tags

Until recently, the cyber attacker methodology behind the biggest breaches of the last decade or so has been pretty consistent: Compromise an endpoint via software exploit, or social engineering a

Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks

29/07/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that’s targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive

Why React Didn’t Kill XSS: The New JavaScript Injection Playbook

29/07/2025 0 Comments 0 tags

React conquered XSS? Think again. That’s the reality facing JavaScript developers in 2025, where attackers have quietly evolved their injection techniques to exploit everything from prototype pollution to AI-generated code,