SECURITY 47
- Fake Receipts Generators the rising threat to major retail brands
- British spies and SAS named in Afghan data breach
- Zyxel security advisory for path traversal vulnerability in APs
- Tracking Protestware Spread 28 npm Packages Affected by Payload Targeting Russian-Language Users
- Konfety Returns Classic Mobile Threat with New Evasion Techniques
- Global Louis Vuitton data breach impacts UK, South Korea, and Turkey
- DOGE Denizen Marko Elez Leaked API Key for xAI
- Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
- macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- At last, a use case for AI agents with sky-high ROI Stealing crypto
- Asus and Adobe vulnerabilities
- Server with Rockerbox Tax Firm Data Exposed 286GB of Records
- Risky Bulletin Browser extensions hijacked for web scraping botnet
- Attackers Inject Code into WordPress Theme to Redirect Visitors
- Animation-Driven Tapjacking on Android
- Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
- Large Language Models (LLMs) Are Falling for Phishing Scams What Happens When AI Gives You the Wrong URL?
- Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be
- Zero-day Bluetooth gap turns millions of headphones into listening stations
- Extracting Lines of Interest From Zeek Logs
- The Case of Hidden Spam Pages
- In the Wild Malware Prototype with Embedded Prompt Injection
- Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
- Another Wave North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
- Trix Shots Remote Code Execution on Aviatrix Controller
- ConnectUnwise Threat actors abuse ConnectWise as builder for signed malware
- Androxgh0st Continues Exploitation Operators Compromise a US University For Hosting C2 Logger
- What’s Inside the Massive Chinese Data Leak
- Fault Injection – Follow the White Rabbit
- Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User
- The TokenBreak Attack
- Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
- GitHub Device Code Phishing
- From Trust to Threat Hijacked Discord Invites Used for Multi-Stage Malware Delivery
- EchoLeak Zero-Click AI Attack in Microsoft Copilot Exposes Company Data
- The Evolution of Linux Binaries in Targeted Cloud Operations
- Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
- Peep show 40K IoT cameras worldwide stream secrets to anyone with a browser
- Critical Vulnerability Patched in SAP NetWeaver
- Blitz Malware A Tale of Game Cheats and Code Repositories
- ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
- Same Automated Impersonation for All
- Roundcube Webmail under fire critical exploit found after a decade
- Fake WordPress Caching Plugin Used to Steal Admin Credentials
- Versa Concerto Understanding and Mitigating CVE-2025-34027
- Mark Your Calendar APT41 Innovative Tactics
- The Sharp Taste of Mimo’lette Analyzing Mimo’s Latest Campaign targeting Craft CMS