This ‘Privacy Browser’ Has Dangerous Hidden Features
23
Oct
2025

This ‘Privacy Browser’ Has Dangerous Hidden Features

The Universe Browser makes some big promises to its potential users. Its online advertisements claim it’s the “fastest browser,” that…

New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data
23
Oct
2025

New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data

Threat researchers at Netskope have uncovered a sophisticated new Remote Access Trojan (RAT) written in Python that masquerades as “Nursultan…

Singapore urges cooperation against cyber threats to protect developing nations
23
Oct
2025

Singapore urges cooperation against cyber threats to protect developing nations

Global cooperation is needed to help smaller and developing nations defend themselves against cyber threats, Singapore has warned, stressing that…

Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks
23
Oct
2025

Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks

The popular Impacket toolkit, a staple in penetration testing and now integrated into the Kali Linux repository, is set for…

China moves to strengthen regulation of AI safety and ethics
23
Oct
2025

China moves to strengthen regulation of AI safety and ethics

Wang Xiang, spokesman for the Legislative Affairs Commission of the National People’s Congress (NPC) Standing Committee, told reporters in Beijing…

Multiple Oracle VM VirtualBox Vulnerabilities Enables Complete Takeover Of VirtualBox
23
Oct
2025

Multiple Oracle VM VirtualBox Vulnerabilities Enables Complete Takeover Of VirtualBox

Oracle has disclosed multiple critical vulnerabilities in its Oracle VM VirtualBox virtualization software, potentially allowing attackers to achieve complete control…

"Jingle Thief" Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards
23
Oct
2025

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated…

Jaguar Land Rover will extend its production halt into a third week following a cyberattack
23
Oct
2025

Cyberattack on Jaguar Land Rover inflicts $2.5B loss on UK economy

Cyberattack on Jaguar Land Rover inflicts $2.5B loss on UK economy Pierluigi Paganini October 23, 2025 The attack on Jaguar…

TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes
23
Oct
2025

TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes

A severe vulnerability in the async-tar Rust library and its popular forks, including the widely used tokio-tar. Dubbed TARmageddon and…

TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE
23
Oct
2025

TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE

The Edera security team has discovered a critical vulnerability in the async-tar Rust library and its descendants, including the widely-used…

BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS
23
Oct
2025

BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS

The Internet Systems Consortium (ISC) has disclosed three critical vulnerabilities in BIND 9, the most widely deployed DNS software globally….

How Lazarus Group used fake job ads to spy on Europe's drone and defense sector
23
Oct
2025

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This…