Cybersecurity News, Threats & Vulnerability Alerts

VENOM PhaaS Platform Targets C-Suite Credentials
Threat actors deploy VENOM phishing-as-a-service platform to steal executive credentials across multiple industries through sophisticated social engineering campaigns.

Zero-Day Windows Exploit Released by Disgruntled Researcher
Security researcher 'Chaotic Eclipse' published proof-of-concept code for an undisclosed Windows zero-day vulnerability enabling local privilege escalation attacks.

ChipSoft Healthcare Software Hit by Ransomware Attack
Dutch healthcare software vendor ChipSoft suffered a ransomware attack forcing offline services for patients and healthcare providers.

EngageLab SDK Flaw Exposed Millions of Crypto Wallets
Microsoft discovered a critical vulnerability in EngageLab SDK that allowed Android apps to bypass security sandboxes and access cryptocurrency wallet data.

Smart Slider 3 Pro Plugin Hijacked via Supply Chain Attack
Attackers compromised the Smart Slider 3 Pro plugin update system, pushing malicious backdoors to WordPress and Joomla sites worldwide.

Eurail Data Breach Exposes 300,000 Customer Records
Eurail B.V. disclosed a December 2025 cyberattack that compromised personal information of over 300,000 European rail pass customers.

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December
Attackers have been exploiting a zero-day vulnerability in Adobe Reader through weaponized PDF documents since December 2025.

Bitcoin Depot Loses $3.6M in Crypto Wallet Breach
Bitcoin Depot suffered a cyberattack that resulted in $3.665 million worth of Bitcoin stolen from company wallets last month.

Magento Stores Hit by SVG-Hidden Credit Card Skimmer
Nearly 100 Magento e-commerce stores compromised by attackers hiding credit card-stealing malware inside pixel-sized SVG images.

UNC6783 Hackers Target BPO Firms to Access Corporate Data
Google's Mandiant identifies UNC6783 threat group exploiting business process outsourcing providers to infiltrate high-value corporate targets across multiple industries.

Atomic Stealer Targets macOS via Script Editor ClickFix Attacks
Cybercriminals deploy Atomic Stealer malware through Script Editor abuse, tricking macOS users into executing malicious Terminal commands via ClickFix tactics.

Apache ActiveMQ Classic RCE Flaw Exposed After 13 Years
Security researchers uncovered a critical remote code execution vulnerability in Apache ActiveMQ Classic that remained hidden for over a decade.

North Korean Hackers Target Go, Rust, PHP Developers
North Korea's Contagious Interview campaign deploys malicious packages across Go, Rust, and PHP ecosystems to target developers worldwide.

FBI: Cyber Crimes Cost Americans $21 Billion in 2025
The FBI reports U.S. victims lost nearly $21 billion to cyber-enabled crimes in 2025, with investment scams and business email compromise leading the surge.

AI Systems Vulnerable to Hidden Web-Based Command Injection
Researchers discover AI models can be tricked into executing malicious instructions hidden on attacker-controlled web pages, potentially exposing sensitive data.

Iranian Hackers Target US Critical Infrastructure PLCs
Iranian-linked threat actors are actively targeting Internet-exposed Rockwell Allen-Bradley programmable logic controllers across U.S. critical infrastructure networks.

CVE-2025-59528: Hackers Exploit Critical Flowise RCE Flaw
Attackers are actively exploiting CVE-2025-59528, a maximum-severity remote code execution vulnerability in Flowise LLM platform.

APT28 Hijacks MikroTik and TP-Link Routers for Espionage
Russia-linked APT28 group compromised insecure MikroTik and TP-Link routers since May 2025, converting them into malicious infrastructure for cyber espionage operations.

Law Enforcement Disrupts APT28 Router Hijacking Campaign
International authorities dismantled FrostArmada, an APT28 operation that compromised MikroTik and TP-Link routers to steal Microsoft credentials.

GrafanaGhost Attack Exploits AI Components for Data Theft
Security researchers discovered GrafanaGhost attack technique that exploits Grafana's AI components to bypass security controls and steal enterprise data.

ComfyUI Botnet Campaign Hijacks AI Servers for Crypto Mining
Attackers are exploiting internet-exposed ComfyUI stable diffusion servers to build cryptocurrency mining botnets through automated Python scanners.

