CyberSecurity Blog
More 
 CyberSecurity Guides
Mastering Ghostwriter: Comprehensive Pentest Management and Reporting Framework
In the complex world of modern penetration testing, maintaining organized documentation, streamlining communication, and producing professional client deliverables are critical …
Most popular
Cybersecurity News
More 
 GlassWorm Malware Exploits VS Code Extensions in Significant Supply Chain Attack
CyberSecureFox 🦊
Koi Security has documented a significant software supply chain attack in the Visual Studio Code …
 
 Malicious npm package “https-proxy-utils” delivers AdaptixC2 and underscores open-source supply chain exposure
CyberSecureFox 🦊
Security researchers at Kaspersky identified a malicious npm package, https-proxy-utils, masquerading as a proxy utility …
 
 TARmageddon (CVE-2025-62518): Critical Rust tar parsing flaw enables RCE in tokio‑tar and forks
CyberSecureFox 🦊
Security researchers at Edera have disclosed a critical logic flaw in the abandoned Rust library …
 
 PassiveNeuron zeros in on Windows Server: new APT wave leverages SQL abuse, Cobalt Strike, and custom implants
CyberSecureFox 🦊
A newly observed campaign by the PassiveNeuron threat actor underscores a strategic pivot toward server-side …
 
  
  
  
  
  
  
  
  
 