New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems
26
Aug
2025

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems

In August 2025, researchers at George Mason University published a groundbreaking study at the 34th USENIX Security Symposium, introducing OneFlip,…

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware
26
Aug
2025

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware

Threat actors are increasingly refining Android droppers to circumvent enhanced security measures, extending their utility beyond sophisticated banking trojans to…

AccuKnox Awarded Patent for Runtime Security of Kernel Events
26
Aug
2025

AccuKnox Awarded Patent for Runtime Security of Kernel Events

Menlo Park, United States, August 26th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Kubernetes and cloud-native security solutions, has…

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers
26
Aug
2025

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers

The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR,…

Beware! Fake Google Play Store Sites Used to Spread Android Malware
26
Aug
2025

Beware! Fake Google Play Store Sites Used to Spread Android Malware

Cybersecurity researchers have identified a resurgence of SpyNote malware campaigns targeting Android users through sophisticated fake Google Play Store websites….

New Android Hook Malware Variant Locks Devices With Ransomware
26
Aug
2025

New Android Hook Malware Variant Locks Devices With Ransomware

Zimperium’s research reveals the Hook Android malware is now a hybrid threat, using ransomware and spyware to steal data via…

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
26
Aug
2025

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild

Google has disclosed a critical zero-day vulnerability in the V8 JavaScript engine used by Chrome, tracked as CVE-2025-5419.  Before a…

Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
26
Aug
2025

Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python

A critical security risk has emerged for Windows users of WhatsApp Desktop who also have Python installed. Attackers can exploit…

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
26
Aug
2025

Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)

CVE-2025-48384, a recently patched vulnerability in the popular distributed revision control system Git, is being exploited by attackers. Details about…

French Retailer Auchan Cyberattack  - Thousands of Customers Personal Data Exposed
26
Aug
2025

French Retailer Auchan Cyberattack  – Thousands of Customers Personal Data Exposed

Major French retail chain Auchan announced on August 21, 2025, that it suffered a significant cybersecurity incident resulting in the…

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection

Google Threat Intelligence Group (GTIG) has uncovered a multifaceted cyber espionage operation attributed to the PRC-nexus threat actor UNC6384, believed…

HOOK Android Trojan
26
Aug
2025

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Aug 26, 2025Ravie Lakshmanan Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features…