• Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild

    Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild

    Microsoft has released patches to fix 67 security flaws, including one zero-day bug in Web Distributed Authoring and Versioning (WEBDAV) that it said has come under active exploitation in the wild. Of the 67 vulnerabilities, 11 are rated Critical and 56 are rated Important in severity. This includes 26 remote code execution flaws, 17 information…

    Read More

  • Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

    Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

    Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting its software products, a majority of which affect Experience Manager (AEM). Of the 254 flaws, 225 reside in AEM, impacting AEM Cloud Service (CS) as well as all versions prior to and including 6.5.22. The issues have been resolved in…

    Read More

  • FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

    FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

    The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs. “By posing as job seekers and initiating conversations through platforms like LinkedIn and Indeed, the group builds rapport with recruiters before delivering phishing messages that lead to…

    Read More

  • Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

    Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

    Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent gaming websites. “Upon execution, the malware displays a fake window to appear legitimate while simultaneously decrypting and executing malicious code in the background,” Trellix security researchers Niranjan Hegde, Vasantha Lakshmanan

    Read More

  • The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

    The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

    Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks…

    Read More

  • Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account

    Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account

    Google has stepped in to address a security flaw that could have made it possible to brute-force an account’s recovery phone number, potentially exposing them to privacy and security risks. The issue, according to Singaporean security researcher “brutecat,” leverages an issue in the company’s account recovery feature. That said, exploiting the vulnerability hinges on several…

    Read More

  • Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises

    Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises

    The threat actor known as Rare Werewolf (formerly Rare Wolf) has been linked to a series of cyber attacks targeting Russia and the Commonwealth of Independent States (CIS) countries. “A distinctive feature of this threat is that the attackers favor using legitimate third-party software over developing their own malicious binaries,” Kaspersky said. “The malicious functionality…

    Read More

  • CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

    CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-32433 (CVSS score: 10.0) – A missing authentication for a critical

    Read More

  • Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

    Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

    The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions into several targets between July 2024 and March 2025. “The victimology includes a South Asian government entity, a European media organization, and more than 70 organizations across a wide range of sectors,” security researchers Aleksandar Milenkoski and Tom

    Read More

  • Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

    Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

    A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai botnet variants and use them to conduct distributed denial-of-service (DDoS) attacks. Akamai, which first discovered the exploitation efforts in late March 2025, said the malicious campaign targets CVE-2025-24016 (CVSS score: 9.9), an unsafe deserialization vulnerability…

    Read More