Scattered Spider Launching Ransomware on Hijacked VMware Systems, Google
28
Jul
2025

Scattered Spider Launching Ransomware on Hijacked VMware Systems, Google

A highly “aggressive” cyber campaign, identified in mid-2025 by Google’s Threat Intelligence Group (GTIG), is posing a severe threat to…

Apple
28
Jul
2025

macOS Sploitlight flaw leaks Apple Intelligence data

Attackers could use a recently patched macOS vulnerability to bypass Transparency, Consent, and Control (TCC) security checks and steal sensitive…

Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems
28
Jul
2025

Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems

China’s Cyberspace Administration, Ministry of Public Security, and Ministry of Industry and Information Technology introduced the Regulations on the Management…

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads
28
Jul
2025

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads

Jul 28, 2025Ravie LakshmananMalware / Developer Tools In what’s the latest instance of a software supply chain attack, unknown threat…

Kioxia launches 245TB LC9, the biggest flash drive on the market
28
Jul
2025

Kioxia launches 245TB LC9, the biggest flash drive on the market

Kioxia has launched solid-state drives of 245.76TB (terabytes), making them the largest capacity commodity flash drives currently on the market….

Cisco
28
Jul
2025

Exploit available for critical Cisco ISE bug exploited in attacks

Security researcher Bobby Gould has published a blog post demonstrating a complete exploit chain for CVE-2025-20281, an unauthenticated remote code…

New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials
28
Jul
2025

New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials

A sophisticated new information stealer named SHUYAL has emerged in the cybersecurity landscape, demonstrating unprecedented scope in its credential harvesting…

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities
28
Jul
2025

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities

Singapore’s critical infrastructure sectors, including energy, water, telecommunications, finance, and government services, are facing an active cyberattack from UNC3886, a…

macOS Sploitlight Flaw Exposes Apple Intelligence-Cached Data to Attackers
28
Jul
2025

macOS Sploitlight Flaw Exposes Apple Intelligence-Cached Data to Attackers

A newly disclosed macOS vulnerability is allowing attackers to bypass Apple’s privacy controls and access sensitive user data, including files…

PaperCut
28
Jul
2025

CISA flags PaperCut RCE bug as exploited in attacks, patch now

CISA warns that threat actors are exploiting a high-severity vulnerability in PaperCut NG/MF print management software, which can allow them…

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info
28
Jul
2025

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info

Raven Stealer has emerged as sophisticated, lightweight information-stealing malware crafted in Delphi and C++, targeting Windows systems with a focus…

Post SMTP Plugin Flaw Allowed Subscribers to Take Over Admin Accounts
28
Jul
2025

Post SMTP Plugin Flaw Allowed Subscribers to Take Over Admin Accounts

If you’re running a WordPress site and rely on the Post SMTP plugin for email delivery, there’s something important you…