Cybersecurity

⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More​

Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done.
This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders, and even turning trusted tools into weapons.

⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More​ Read Post »

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk​

Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now.
Get the complete Holiday Season Security Playbook here.
Bottom Line Up Front
The 2024 holiday season saw major

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk​ Read Post »

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors​

Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors.
The activity, described as akin to an “exploit shotgun” approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors​ Read Post »

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor​

Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving “credible reports” in August 2025 that unknown threat actors were abusing the backward compatibility feature to gain unauthorized access to users’ devices.
“Threat actors were leveraging basic social engineering techniques alongside unpatched (0-day) exploits in Internet Explorer’s JavaScript

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor​ Read Post »

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns​

Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone for its operations to stay resilient in the face of infrastructure takedowns.
“Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns​ Read Post »

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year​

Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year.
The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to the U.S. government, it’s assessed to be a publicly-traded

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year​ Read Post »

Moving Beyond Awareness: How Threat Hunting Builds Readiness​

Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone.
Make no mistake, as a security professional, I love this month. Launched by CISA and the National

Moving Beyond Awareness: How Threat Hunting Builds Readiness​ Read Post »

RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing​

Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP).
The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMD’s incomplete protections that make it possible to perform a single memory

RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing​ Read Post »

New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions​

Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users’ knowledge pixel-by-pixel.
The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of

New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions​ Read Post »

What AI Reveals About Web Applications— and Why It Matters​

Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and enabling attackers to map your

What AI Reveals About Web Applications— and Why It Matters​ Read Post »

Scroll to Top