2026-02-25 Daily Vulns
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2018-25158 Chamilo - Chamillo LMS...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2018-25158 Chamilo - Chamillo LMS...
Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models Questions about how AI models can be copied and replicated are moving from theory into active security debates after Anth...
Understanding the Behavioral Science Behind Online Harassment Harassment is messy. It crosses platforms, jurisdictions, and legal definitions. It often involves large numbers of participants actin...
RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN 🚨 A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecti...
Massiv: The New Threat to Your Mobile Banking Security 🚨 Recent research performed by our Mobile Threat Intelligence (MTI) team revealed yet another Android banking Trojan, named Massiv. This new ...
Go Library Maintainer Critiques GitHub’s Dependabot as a ‘Noise Machine’ 🚨 A Go library maintainer has urged developers to turn off GitHub’s Dependabot, arguing that false positives from the depen...
Crypto-Funded Human Trafficking Is Exploding 🚨 Cryptocurrency’s frictionless, transnational, low-regulation transactions have long promised the ability to pay anyone in the world for anything. Mor...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2025-13563 BuddhaThemes - Lizza L...
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb 🚨 Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures ...
New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA A highly sophisticated phishing framework named Starkiller has recently emerged, offering attackers an advanced method to s...
How to Set Up Private DNS Mode on Your iPhone - Why You Should Do It ASAP Unencrypted DNS can expose your browsing activity, but private DNS helps keep it secure on iPhone. A private DNS for your ...
Data Breaches in 2026 - What’s Old, What’s New? Cybersecurity risks are growing in scale and complexity as we progress through 2026. As a result, data breaches are no longer uncommon; they are an ...
Another Day, Another Malicious JPEG 🚨 Source: SANS Internet Storm Center Published on: February 23, 2026 Xavier discussed recent malware campaigns that download JPEG files with embedded malicious...
2025 - The Untold Stories of Check Point Research Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. A la...
Another Day, Another Malicious JPEG 🚨 Source: SANS Internet Storm Center Published on: February 23, 2026 Xavier discussed recent malware campaigns that download JPEG files with embedded malicious...
UK Council Faces Data Breach Claim Over Trans Complaints A UK council is facing a data breach claim after confidential complainant details were mistakenly shared with a local politician following ...
Spanish Police Arrest Hacker for €0.01 Luxury Hotel Stays 🚓 Spanish police have made a significant arrest, apprehending a 20-year-old man in Madrid who allegedly manipulated the online payment sys...
New Cyberattack Discovered 🚨 A new type of cyberattack has been discovered that uses ordinary images to hide a dangerous virus. Experts at Veracode Threat Research found a malicious package on NPM...
SEC Consult Security Advisory SEC Consult Vulnerability Lab has issued a security advisory detailing multiple critical vulnerabilities in NesterSoft WorkTime (on-prem/cloud), impacting vulnerable ...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2016-3481 n/a - n/a Unspeci...