Data breach at Chinese infosec firm reveals cyber-weapons and target list
Chinese infosec blog MXRN last week reported a data breach at a security company called Knownsec that has ties to Beijing and China’s military. MXRN says the company leaked over 12,000 classified d...
Dangerous runC flaws could allow hackers to escape Docker containers
Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system. An attacker...
Microsoft Uncovers 'Whisper Leak' Attack That Identifies AI Chat Topics in Encrypted Traffic
Microsoft has revealed a novel side-channel attack, dubbed Whisper Leak, that can identify AI chat topics within encrypted network traffic. This attack exploits the data exchanged between users and...
2025-11-08 Daily Vulns
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2025-11212 Google - Chrome ...
LANDFALL New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
Unit 42 researchers have uncovered a previously unknown Android spyware family, which we have named LANDFALL. To deliver the spyware, attackers exploited a zero-day vulnerability (CVE-2025-21042) i...
List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
Summary Analysis of underground advertisements reveals striking commonalities across malicious AI platforms. Most notably, nearly every notable tool advertised emphasized its ability to support ph...
Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware
The attacker’s modus operandi involved using a compromised email account to send malicious messages to multiple hotel establishments. This campaign leverages spear-phishing emails that impersonate ...
Gootloader malware back for the attack, serves up ransomware
Gootloader malware has resurfaced after a period of dormancy, now delivering ransomware in partnership with the Vanilla Tempest group (aka Rhysida). Huntress Labs has identified three recent Gootlo...
Google sounds alarm on self-modifying AI malware
Google’s Threat Intelligence Group (GTIG) warned of a new generation of malware that uses AI during execution to mutate, adapt, and collect data in real time, helping it evade detection more effect...
GlassWorm Returns New Wave Strikes as We Expose Attacker Infrastructure
“…on November 6, 2025 - sixteen days later - we detected a new wave of GlassWorm infections. Three more extensions compromised. A fresh Solana blockchain transaction providing new C2 endpoints. Sam...
Comparitech reports ransomware surges 25% in October, hitting manufacturers, healthcare, transportation
New data from Comparitech shows ransomware attacks jumped 25% in October, climbing from 546 in September to 684. This marks a significant increase in attacks and the third-highest monthly total thi...
2025-11-06 Daily Vulns
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2016-15054 Nagios - XI Nagi...
Russian hackers sneak a full Linux virtual machine inside Windows to run undetected
Russian hackers are exploiting Microsoft’s Hyper-V virtualization feature to create a hidden Linux virtual machine within a target’s host, allowing them to covertly install secret implants on the v...
How an Attacker Drained 28M from Balancer Through Rounding Error Exploitation
The attack exploited a mathematical vulnerability in how Balancer’s ComposableStablePools handle small-value swaps. When token balances are pushed to specific rounding boundaries (8-9 wei range), S...
HackedGPT – 7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks
Seven critical vulnerabilities in OpenAI’s ChatGPT, affecting both GPT-4o and the newly released GPT-5 models, that could allow attackers to steal private user data through stealthy, zero-click exp...
Google warns of new AI-powered malware families deployed in the wild
Google’s Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language mo...
Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover
Hundreds of thousands of websites may be exposed to account takeover attacks due to a critical-severity vulnerability in the email delivery WordPress plugin Post SMTP, Defiant warns.\n\nPost SMTP v...
Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
By enabling the Hyper-V role and deploying a minimalistic Alpine Linux-based virtual machine, the attackers created a hidden operational environment that hosts custom malware while evading traditio...
Critical flaws in Fuji Electric, Delta Electronics, Survision, Radiometrics, IDIS systems raise security concerns for industrial sector
In another advisory, CISA identified that Radiometrics’ VizAir systems contained Missing Authentication for Critical Function and Insufficiently Protected Credentials vulnerabilities, impacting all...