Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

02/10/2025 0 Comments 0 tags

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.). Slovak cybersecurity

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

01/10/2025 0 Comments 0 tags

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

01/10/2025 0 Comments 0 tags

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

01/10/2025 0 Comments 0 tags

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain

How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

01/10/2025 0 Comments 0 tags

AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

01/10/2025 0 Comments 0 tags

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022. French

2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

01/10/2025 0 Comments 0 tags

Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

01/10/2025 0 Comments 0 tags

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian fraud prevention firm Cleafy, which

Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs

01/10/2025 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has

$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections

30/09/2025 0 Comments 0 tags

A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the latest defenses on Intel and AMD cloud