Chollima APT Group Targets Job Seekers and Organizations with JavaScript-Based Malware
05
Aug
2025

Chollima APT Group Targets Job Seekers and Organizations with JavaScript-Based Malware

The North Korean-linked Chollima advanced persistent threat (APT) group, also known as Famous Chollima, has been orchestrating a persistent cyber…

Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover
05
Aug
2025

Chaining NVIDIA’s Triton Server flaws exposes AI systems to remote takeover

Chaining NVIDIA’s Triton Server flaws exposes AI systems to remote takeover Pierluigi Paganini August 05, 2025 New flaws in NVIDIA’s…

Fashion Giant Chanel Hacked in Wave of Salesforce Attacks
05
Aug
2025

Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

French luxury fashion house Chanel has become the latest victim in a sophisticated cybercrime campaign targeting major corporations through their…

AI-Driven Scam
05
Aug
2025

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Aug 05, 2025Ravie LakshmananMalware / Mobile Security Cybersecurity researchers have lifted the veil on a widespread malicious campaign that’s targeting…

Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction
05
Aug
2025

Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction

Google released its August 2025 Android Security Bulletin on August 4, revealing a critical vulnerability that poses significant risks to…

Streamlit Vulnerability Exposes Users to Cloud Account Takeover Attacks
05
Aug
2025

Streamlit Vulnerability Exposes Users to Cloud Account Takeover Attacks

A critical security flaw in Streamlit, the popular open-source framework for building data applications, has been discovered that could allow…

Ransomware groups shift to quadruple extortion to maximize pressure
05
Aug
2025

Ransomware groups shift to quadruple extortion to maximize pressure

Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach,…

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
05
Aug
2025

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

A sophisticated new Android malware campaign has emerged targeting Indian banking customers through convincing impersonations of popular financial applications. The…

WAF Protections Bypassed via JS Injection and Parameter Pollution for XSS Attacks
05
Aug
2025

WAF Protections Bypassed via JS Injection and Parameter Pollution for XSS Attacks

A groundbreaking security research has revealed that parameter pollution techniques combined with JavaScript injection can bypass 70% of modern Web Application…

Security tooling pitfalls for small teams: Cost, complexity, and low ROI
05
Aug
2025

Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large…

SonicWall SSL VPN Zero-Day
05
Aug
2025

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported

Aug 05, 2025Ravie LakshmananZero-Day / Network Security SonicWall said it’s actively investigating reports to determine if there is a new…

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
05
Aug
2025

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control

A critical vulnerability chain in NVIDIA’s Triton Inference Server that allows unauthenticated attackers to achieve complete remote code execution (RCE)…