CyberSecurity Blog
More
CyberSecurity Guides
Mastering Ghostwriter: Comprehensive Pentest Management and Reporting Framework
In the complex world of modern penetration testing, maintaining organized documentation, streamlining communication, and producing professional client deliverables are critical …
Most popular
Cybersecurity News
More
Phantom Papa phishing campaign delivers Phantom stealer via RAR→IMG/ISO, adds webcam extortion module
CyberSecureFox 🦊
In June 2025, researchers documented a new phishing wave dubbed Phantom Papa that distributes the …

Drift OAuth Token Theft Expands Beyond Salesforce, Impacts Google Workspace; Mandiant Ties Activity to UNC6395
CyberSecureFox 🦊
Google Threat Intelligence (Mandiant) has linked a wave of intrusions to the theft and reuse …

FreePBX Zero‑Day (CVE-2025-57819) Exploited in the Wild: What to Do Now
CyberSecureFox 🦊
Sangoma Technologies has confirmed in-the-wild exploitation of a critical zero‑day in FreePBX, the open-source PBX …

Critical Vulnerabilities in Pudu Robotics’ Service Robots Exposed and Remediated
CyberSecureFox 🦊
An independent security researcher known as BobDaHacker disclosed critical weaknesses in the Pudu Robotics ecosystem …