Cybersecurity Guides, Ethical Hacking & Privacy

Cybersecurity News

More
Android Trojan graphic depicting malware activity and cryptocurrency connections.

TrickMo C turns infected Androids into TON-based proxy nodes

CyberSecureFox Editorial Team

Researchers at ThreatFabric have identified a new variant of the Android trojan TrickMo, which uses …

Red diamond under dome with locks surrounded by boxes and bugs.

RubyGems blocks new registrations after suspected malware campaign

CyberSecureFox Editorial Team

RubyGems — the standard package manager for the Ruby programming language — has temporarily blocked …

Exim server illustration highlighting CVE-2026-45185 vulnerability.

Critical GnuTLS Use-After-Free Vulnerability in Exim (CVE-2026-45185)

CyberSecureFox Editorial Team

The Exim project has released an emergency security update that fixes the CVE-2026-45185 use-after-free vulnerability, …

Illustration of data flow involving RubyGems and storage misuse.

GemStuffer campaign turns RubyGems into free data infrastructure

CyberSecureFox Editorial Team

Researchers at Socket discovered a campaign called GemStuffer, in which more than 150 packages were …