npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
14
Oct
2025

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Oct 14, 2025Ravie LakshmananMalware / Typosquatting Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that…

Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands
14
Oct
2025

Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands

Elastic has disclosed a critical vulnerability in its Elastic Cloud Enterprise (ECE) platform that allows administrators with malicious intent to…

Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution
14
Oct
2025

Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution

Ivanti has disclosed 13 vulnerabilities in Ivanti Endpoint Manager (EPM), including two high-severity issues that could enable privilege escalation and…

What Chat Control means for your privacy
14
Oct
2025

What Chat Control means for your privacy

The EU’s proposed Chat Control (CSAM Regulation) aims to combat child sexual abuse material by requiring digital platforms to detect,…

Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access
14
Oct
2025

Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access

A new evolution is underway in the Russian cybercrime ecosystem: market operators and threat actors are rapidly shifting from selling…

TA585 Deploys Novel Web-Injection to Deliver MonsterV2 Malware on Windows
14
Oct
2025

TA585 Deploys Novel Web-Injection to Deliver MonsterV2 Malware on Windows

As cybercrime continues to evolve, new adversaries and innovative tactics challenge defenders daily. The recently emerged threat group TA585 exemplifies…

What if your privacy tools could learn as they go?
14
Oct
2025

What if your privacy tools could learn as they go?

A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how…

UK Cyberattacks Increase
14
Oct
2025

UK Cyberattacks Increase By 50%, NCSC Warns

The UK cyberattacks increase continues to alarm security experts, with the National Cyber Security Centre (NCSC) revealing that it handled…

Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads
14
Oct
2025

Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads

A sophisticated campaign targeting macOS users has emerged through spoofed Homebrew installer websites that deliver malicious payloads alongside legitimate package…

Simple Prompt Injection Lets Hackers Bypass OpenAI Guardrails Framework
14
Oct
2025

Simple Prompt Injection Lets Hackers Bypass OpenAI Guardrails Framework

Security researchers have discovered a fundamental vulnerability in OpenAI’s newly released Guardrails framework that can be exploited using basic prompt…

The solar power boom opened a backdoor for cybercriminals
14
Oct
2025

The solar power boom opened a backdoor for cybercriminals

Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service…

Pro-Russian Hacktivist Attacking OT/ICS Devices to Steal Login Credentials
14
Oct
2025

Pro-Russian Hacktivist Attacking OT/ICS Devices to Steal Login Credentials

A newly identified pro-Russian hacktivist group has successfully infiltrated operational technology and industrial control systems belonging to critical infrastructure organizations,…