The Future of API Security Reviews
09
Aug
2025

The Future of API Security Reviews

As organizations increasingly rely on application programming interfaces (APIs) to facilitate communication and data exchange between software systems, these “gates”…

WinRAR Zero-Day CVE-2025-8088 Exploited to Spread RomCom Malware
09
Aug
2025

WinRAR Zero-Day CVE-2025-8088 Exploited to Spread RomCom Malware

Critical WinRAR flaw CVE-2025-8088 exploited by Russia-linked hackers to spread RomCom malware, update to version 7.13 now to stay protected….

ChatGPT "0-Click" Vulnerability in Connectors Exposed Sensitive Google Drive Data
09
Aug
2025

ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data

A critical vulnerability in OpenAI’s ChatGPT Connectors feature allows attackers to exfiltrate sensitive data from connected Google Drive accounts without…

SMBs Know the Risks, So Why Are Cybercriminals Still Winning?
09
Aug
2025

SMBs Know the Risks, So Why Are Cybercriminals Still Winning?

Cybercriminals are no longer primarily focused on large enterprises. They now see small- and medium-sized businesses (SMBs) as prime targets…

Linux Kernel Vulnerability Allows Attackers to Gain Full Kernel-Level Control From Chrome Sandbox
09
Aug
2025

Linux Kernel Vulnerability Allows Attackers to Gain Full Kernel-Level Control From Chrome Sandbox

August 9, 2025: A severe security vulnerability in the Linux kernel, dubbed CVE-2025-38236, has been uncovered by Google Project Zero…

The US Court Records System Has Been Hacked
09
Aug
2025

The US Court Records System Has Been Hacked

In response to recent cyberattacks, the federal judiciary said its been in the process of implementing new safeguards to address…

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data
09
Aug
2025

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

Microsoft security researchers have uncovered four critical vulnerabilities in Windows BitLocker that could allow attackers with physical access to bypass…

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability
09
Aug
2025

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability

The cybersecurity community faces a significant threat as scanning data reveals over 28,000 unpatched Microsoft Exchange servers remain exposed on…

New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox
09
Aug
2025

New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox

August 9, 2025 — A critical vulnerability in the Linux kernel, identified as CVE-2025-38236, has exposed a flaw that could…

Germany limits police spyware use to serious crimes
09
Aug
2025

Germany limits police spyware use to serious crimes

Germany limits police spyware use to serious crimes Pierluigi Paganini August 09, 2025 Germany’s top court ruled police can use…

A Cobalt Strike Like Tool That Turns Chrome into C2 Platform
09
Aug
2025

A Cobalt Strike Like Tool That Turns Chrome into C2 Platform

At DEF CON 33, security researcher Mike Weber of Praetorian Security unveiled ChromeAlone — a Chromium-based browser Command & Control…

CastleBot MaaS Unleashes Diverse Payloads in Coordinated Ransomware Attacks
09
Aug
2025

CastleBot MaaS Unleashes Diverse Payloads in Coordinated Ransomware Attacks

IBM X-Force has uncovered CastleBot, a nascent malware framework operating as a Malware-as-a-Service (MaaS) platform, enabling cybercriminals to deploy a…