Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads
28
Jul
2025

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads

Jul 28, 2025Ravie LakshmananMalware / Developer Tools In what’s the latest instance of a software supply chain attack, unknown threat…

Kioxia launches 245TB LC9, the biggest flash drive on the market
28
Jul
2025

Kioxia launches 245TB LC9, the biggest flash drive on the market

Kioxia has launched solid-state drives of 245.76TB (terabytes), making them the largest capacity commodity flash drives currently on the market….

Cisco
28
Jul
2025

Exploit available for critical Cisco ISE bug exploited in attacks

Security researcher Bobby Gould has published a blog post demonstrating a complete exploit chain for CVE-2025-20281, an unauthenticated remote code…

New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials
28
Jul
2025

New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials

A sophisticated new information stealer named SHUYAL has emerged in the cybersecurity landscape, demonstrating unprecedented scope in its credential harvesting…

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities
28
Jul
2025

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities

Singapore’s critical infrastructure sectors, including energy, water, telecommunications, finance, and government services, are facing an active cyberattack from UNC3886, a…

macOS Sploitlight Flaw Exposes Apple Intelligence-Cached Data to Attackers
28
Jul
2025

macOS Sploitlight Flaw Exposes Apple Intelligence-Cached Data to Attackers

A newly disclosed macOS vulnerability is allowing attackers to bypass Apple’s privacy controls and access sensitive user data, including files…

PaperCut
28
Jul
2025

CISA flags PaperCut RCE bug as exploited in attacks, patch now

CISA warns that threat actors are exploiting a high-severity vulnerability in PaperCut NG/MF print management software, which can allow them…

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info
28
Jul
2025

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info

Raven Stealer has emerged as sophisticated, lightweight information-stealing malware crafted in Delphi and C++, targeting Windows systems with a focus…

Post SMTP Plugin Flaw Allowed Subscribers to Take Over Admin Accounts
28
Jul
2025

Post SMTP Plugin Flaw Allowed Subscribers to Take Over Admin Accounts

If you’re running a WordPress site and rely on the Post SMTP plugin for email delivery, there’s something important you…

GPT-5
28
Jul
2025

OpenAI prepares GPT-5 for roll out

OpenAI’s ChatGPT-5 could drop in the coming days, and it could be one of the best models from the Microsoft-backed…

Threat Actors Claim Breach of Airpay Payment Gateway
28
Jul
2025

Threat Actors Claim Breach of Airpay Payment Gateway

Cybercriminals have reportedly claimed a successful breach of Airpay, an Indian payment gateway service, raising serious concerns about the security…

Allianz Life discloses massive data breach linked to supply-chain attack
28
Jul
2025

Allianz Life discloses massive data breach linked to supply-chain attack

Allianz Life Insurance Company of North America on Friday disclosed a massive data breach affecting most of the firm’s 1.4…