NPM
07
Jun
2025

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

A significant supply chain attack hit NPM after 16 popular Gluestack ‘react-native-aria’ packages with over 950,000 weekly downloads were compromised to…

Over 20 Malicious Apps on Google Play Target Users for Seed Phrases
07
Jun
2025

Over 20 Malicious Apps on Google Play Target Users for Seed Phrases

A recent investigation by threat intelligence firm Cyble has spotted a campaign targeting cryptocurrency users through the Google Play Store…

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source
07
Jun
2025

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source Pierluigi…

Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
07
Jun
2025

Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux

Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux,…

The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking
07
Jun
2025

The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking

All of that would represent a serious threat to national security. Except that, strangely, Apple flatly denies it happened. “We…

New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
07
Jun
2025

New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers

A sophisticated new information-stealing malware written in the Rust programming language has emerged, demonstrating advanced capabilities to extract sensitive data…

Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
07
Jun
2025

Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts

Cybersecurity researchers have identified a sophisticated new social engineering campaign that exploits fundamental human trust in everyday computer interactions. The…

Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
07
Jun
2025

Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User

A sophisticated malware distribution campaign has weaponized over 140 GitHub repositories to target inexperienced cybercriminals and gaming cheat users, representing…

Attackers exploit Fortinet flaws to deploy Qilin ransomware
07
Jun
2025

Attackers exploit Fortinet flaws to deploy Qilin ransomware

Attackers exploit Fortinet flaws to deploy Qilin ransomware Pierluigi Paganini June 06, 2025 Qilin ransomware now exploits Fortinet vulnerabilities to…

Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order
07
Jun
2025

Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order

Listen to the article 6 min This audio is auto-generated. Please let us know if you have feedback. President Donald…

Tim Starks
07
Jun
2025

Trump cyber executive order takes aim at prior orders, secure software, more

President Donald Trump signed an executive order Friday that the White House says promotes developing secure software, adopting the latest…

ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information
06
Jun
2025

ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information

The AhnLab Security Intelligence Center (ASEC) has recently issued a detailed report confirming the persistent distribution of ViperSoftX malware by…