“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits [email protected] (The Hacker News)
A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel attacks targeting Apple silicon that could be exploited to leak sensitive information from web browsers like Safari and Google Chrome. The attacks have been codenamed Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP)…
-
How Interlock Ransomware Infects Healthcare Organizations [email protected] (The Hacker News)
Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and healthcare data stolen during the Change Healthcare ransomware attack, a figure that nearly doubles the previously disclosed total. This breach shows just how deeply ransomwareRead More
-
Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution [email protected] (The Hacker News)
A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE-2025-22604, carries a CVSS score of 9.1 out of a maximum of 10.0. “Due to a flaw in the multi-line…
-
UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents [email protected] (The Hacker News)
The advanced persistent threat (APT) group known as UAC-0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE. “This research focuses on completing the picture of UAC-0063’s operations, particularly documenting their expansion beyond their initial focus on Central Asia,Read…
-
Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer [email protected] (The Hacker News)
Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked as CVE-2025-22217 (CVSS score: 8.6), has been described as an unauthenticated blind SQL injection. “A malicious user with network access may be able to use specially crafted…
-
Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability [email protected] (The Hacker News)
Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. “Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration,” GreyNoise researcher Glenn Thorpe said in an alertRead More
-
PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks [email protected] (The Hacker News)
A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that’s delivered…
-
DeepSeek claims ‘malicious attacks’ disrupting AI service
Post ContentRead More
-
OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking [email protected] (The Hacker News)
Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf –…
-
Apple zero-day vulnerability under attack on iOS devices
Post ContentRead More
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova