Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

16/07/2025 0 Comments 0 tags

Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wild. The high-severity vulnerability in

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

16/07/2025 0 Comments 0 tags

Social engineering attacks have entered a new era—and they’re coming fast, smart, and deeply personalized. It’s no longer just suspicious emails in your spam folder. Today’s attackers use generative AI,

Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

16/07/2025 0 Comments 0 tags

Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw in the SQLite open-source database engine before it could have been exploited in

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

15/07/2025 0 Comments 0 tags

Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025, a significant drop from 20.5 million DDoS attacks it fended off the

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

15/07/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted a wide range of sectors in Australia, Brazil, Europe, and the United States

AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

15/07/2025 0 Comments 0 tags

Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in January 2019 and has since served as the

Securing Agentic AI: How to Protect the Invisible Identity Access

15/07/2025 0 Comments 0 tags

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

15/07/2025 0 Comments 0 tags

Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon. The activity

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

15/07/2025 0 Comments 0 tags

The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

14/07/2025 0 Comments 0 tags

Threat actors behind the Interlock ransomware group have unleashed a new PHP variant of its bespoke remote access trojan (RAT) as part of a widespread campaign using a variant of