GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

10/11/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

08/11/2025 0 Comments 0 tags

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network traffic to glean details about model conversation topics

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

07/11/2025 0 Comments 0 tags

A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade” Android spyware dubbed LANDFALL in targeted attacks in the Middle East. The

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

07/11/2025 0 Comments 0 tags

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

07/11/2025 0 Comments 0 tags

A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems. According to software supply chain

Enterprise Credentials at Risk – Same Old, Same Old?

07/11/2025 0 Comments 0 tags

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

07/11/2025 0 Comments 0 tags

Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

07/11/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

06/11/2025 0 Comments 0 tags

A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

06/11/2025 0 Comments 0 tags

Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure