Cyber Security
“`html Cybercriminals are abusing VMware ESXi instances in the wild utilizing a zero-day exploit toolkit that combines several vulnerabilities for VM breaches. The cybersecurity firm Huntress interrupted one such incident, linking the initial breach to an...
Cyber Security
“`html Two malicious Chrome extensions have jeopardized more than 900,000 users by covertly extracting ChatGPT and DeepSeek conversations, along with comprehensive browsing histories, to the attackers’ servers. Uncovered by OX Security analysts, the...
Cyber Security
“`html WhatsApp’s multi-device encryption framework has persistently exposed metadata, permitting adversaries to identify users’ device operating systems, facilitating targeted malware transmission. Recent studies underscore partial corrections by Meta, yet...
Cyber Security
“`html Resecurity implements artificial data honeypots to outwit threat actors, converting reconnaissance into useful intelligence. A recent operation not only ensnared an Egyptian-associated hacker but also misled the ShinyHunters collective into believing...
Cyber Security
“`html An alarming cycle of cybercrime has arisen where pilfered credentials from infostealer malware permit cybercriminals to commandeer authentic business sites and convert them into platforms for distributing malware. Recent findings from the Hudson Rock...
Cyber Security
“`html More than 10,000 Fortinet firewalls globally remain exposed to CVE-2020-12812, a vulnerability allowing bypass of multi-factor authentication (MFA) identified over five and a half years ago. Recently, Shadowserver incorporated the issue into its daily...
Cyber Security
“`html The cybersecurity environment in 2025 has experienced an extraordinary increase in significant vulnerabilities, with more than 21,500 CVEs revealed in merely the first six months of the year, indicating a 16-18% rise when compared to 2024. Among these, a...
Cyber Security
“`html A fresh onset of GlassWorm malware has surfaced, representing a notable change in targeting approach from Windows to macOS platforms. This self-replicating worm, disseminated via harmful VS Code extensions on the Open VSX marketplace, has already amassed...
Cyber Security
“`html A vast-scale web skimming scheme has surfaced throughout the internet, targeting online consumers and account holders with unparalleled reach. Security analysts have detected an extensive global initiative with over 50 scripts that seize sensitive data...
Cyber Security
“`html Chinese cyber adversaries known as Silver Fox are targeting Indian institutions via advanced phishing operations that mimic genuine income tax documents. This attack campaign leverages authentic-looking emails from the Income Tax Department to deceive...