How to Protest Safely in the Age of Surveillance
12
Jun
2025

How to Protest Safely in the Age of Surveillance

If you insist on using biometric unlocking methods to have faster access to your devices, keep in mind that some…

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware
12
Jun
2025

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Security researchers have uncovered a sophisticated malware campaign exploiting a little-known flaw in Discord’s invitation system, enabling cybercriminals to hijack…

Predator spyware activity surfaces in new places with new tricks
12
Jun
2025

Predator spyware activity surfaces in new places with new tricks

Recorded Future said on Thursday that it had linked Intellexa infrastructure to new locations, the latest indication that the Predator…

Cloudflare
12
Jun
2025

Google Cloud and Cloudflare hit by widespread service outages

Google Cloud and Cloudflare are investigating ongoing outages impacting access to sites and various services across multiple regions. Cloudflare first…

Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions
12
Jun
2025

Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions

A critical command injection vulnerability in Palo Alto Networks PAN-OS operating system enables authenticated administrative users to escalate privileges and…

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification
12
Jun
2025

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification

A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and digital signatures, has been patched after…

How VexTrio and Affiliates Run a Global Scam Network
12
Jun
2025

How VexTrio and Affiliates Run a Global Scam Network

Jun 12, 2025Ravie LakshmananThreat Intelligence / Malware The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been…

OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification
12
Jun
2025

OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

A critical vulnerability in the widely-used OpenPGP.js library has been discovered that allows attackers to forge digital signatures and deceive…

Social Media Is Now a DIY Alert System for ICE Raids
12
Jun
2025

Social Media Is Now a DIY Alert System for ICE Raids

Alerts about operations are disseminated through direct messages, WhatsApp, or posts on each page’s feed. In turn, it is possible…

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT
12
Jun
2025

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community for its sophisticated capabilities and its…

Graphite spyware used in Apple iOS zero-click attacks on journalists
12
Jun
2025

Graphite spyware used in Apple iOS zero-click attacks on journalists

Forensic investigation has confirmed the use of Paragon’s Graphite spyware platform in zero-click attacks that targeted Apple iOS devices of…

Microsoft Outlook's New Two-Click View for Encrypted Emails Protects From Accidental Exposure
12
Jun
2025

Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure

Microsoft is set to launch a significant security enhancement for Outlook users across multiple platforms. Starting April 2025, the company…