New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

16/09/2025 0 Comments 0 tags

Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. “The observed campaign uses a

Securing the Agentic Era: Introducing Astrix’s AI Agent Control Plane

16/09/2025 0 Comments 0 tags

AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

16/09/2025 0 Comments 0 tags

Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE-2025-43300 (CVSS score: 8.8), an out-of-bounds

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

16/09/2025 0 Comments 0 tags

A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from South Korean semiconductor

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

16/09/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages that belong to multiple maintainers. “The compromised versions include

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

15/09/2025 0 Comments 0 tags

The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a previously undocumented USB worm called SnakeDisk. “The worm

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

15/09/2025 0 Comments 0 tags

In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional trust and ensure business continuity. This week, we saw a

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

15/09/2025 0 Comments 0 tags

Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we’ll explore what a “browser-based attack” is, and why they’re proving

AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns

15/09/2025 0 Comments 0 tags

A new artificial intelligence (AI)-powered penetration testing tool linked to a China-based company has attracted nearly 11,000 downloads on the Python Package Index (PyPI) repository, raising concerns that it could

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks

15/09/2025 0 Comments 0 tags

Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute malware. “The attackers manipulated search rankings with SEO plugins and