Threat Actors Exploit Open-Source Vulnerabilities to Spread Malicious Code
05
Aug
2025

Threat Actors Exploit Open-Source Vulnerabilities to Spread Malicious Code

FortiGuard Labs has reported a sustained trend in the exploitation of open-source software (OSS) repositories for malware dissemination within supply…

don't scan that QR code it could be a brushing scam
05
Aug
2025

Unexpected snail mail packages are being sent with scammy QR codes, warns FBI

Receiving an unexpected package in the post is not always a pleasant surprise. The FBI has warned the public about…

HTTP Request Smuggling Explained: with seasoned bug bounty hunter NahamSec and world-class researcher James Kettle
05
Aug
2025

HTTP Request Smuggling Explained: with seasoned bug bounty hunter NahamSec and world-class researcher James Kettle

Amelia Coen | 05 August 2025 at 11:08 UTC Ever wondered how attackers can compromise modern websites by exploiting invisible…

Android
05
Aug
2025

Android gets patches for Qualcomm flaws exploited in attacks

Google has released security patches for six vulnerabilities in Android’s August 2025 security update, including two Qualcomm flaws exploited in…

Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code
05
Aug
2025

Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code

The open-source software ecosystem, once considered a bastion of collaborative development, has become an increasingly attractive target for cybercriminals seeking…

MediaTek Chip Vulnerabilities Allow Attackers to Gain Elevated Access
05
Aug
2025

MediaTek Chip Vulnerabilities Allow Attackers to Gain Elevated Access

MediaTek has disclosed three critical security vulnerabilities affecting dozens of its chipsets, potentially allowing attackers to gain elevated system privileges…

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
05
Aug
2025

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents

Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy…

Microsoft
05
Aug
2025

Microsoft increases Zero Day Quest prize pool to $5 million

Microsoft will offer up to $5 million in bounty awards at this year’s Zero Day Quest hacking contest, which the…

Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware
05
Aug
2025

Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware

North Korean-linked Famous Chollima APT group has emerged as a sophisticated threat actor, orchestrating targeted campaigns against job seekers and…

Raspberry Robin Malware Targets Windows Systems via New CLFS Driver Exploit
05
Aug
2025

Raspberry Robin Malware Targets Windows Systems via New CLFS Driver Exploit

The Raspberry Robin malware, also known as Roshtyak, has undergone substantial updates that enhance its evasion and persistence on Windows…

SonicWall investigates possible zero-day amid Akira ransomware surge
05
Aug
2025

SonicWall investigates possible zero-day amid Akira ransomware surge

SonicWall investigates possible zero-day amid Akira ransomware surge Pierluigi Paganini August 05, 2025 SonicWall probes possible new zero-day after spike…

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution
05
Aug
2025

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution

A sophisticated method to bypass Web Application Firewall (WAF) protections using HTTP Parameter Pollution techniques combined with JavaScript injection.  The…