Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

25/09/2025 0 Comments 0 tags

The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

25/09/2025 0 Comments 0 tags

Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and Ethereum wallet keys from source code. The crates, named faster_log and async_println,

Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

25/09/2025 0 Comments 0 tags

Cisco has warned of a high-severity security flaw in IOS Software and IOS XE Software that could allow a remote attacker to execute arbitrary code or trigger a denial-of-service (DoS)

Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

24/09/2025 0 Comments 0 tags

A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

24/09/2025 0 Comments 0 tags

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

24/09/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks.

iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

24/09/2025 0 Comments 0 tags

Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

24/09/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus. “The exact connection to

How One Bad Password Ended a 158-Year-Old Business

24/09/2025 0 Comments 0 tags

Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of

State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

24/09/2025 0 Comments 0 tags

Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been exploited by state-sponsored threat actors. The vulnerability, tracked