CyberSecurity Blog
More
CyberSecurity Guides
Mastering Ghostwriter: Comprehensive Pentest Management and Reporting Framework
In the complex world of modern penetration testing, maintaining organized documentation, streamlining communication, and producing professional client deliverables are critical …
Most popular
Cybersecurity News
More
Discord probes third-party support breach as payment and identity data exposed
CyberSecureFox 🦊
On 20 September 2025, Discord disclosed a security incident stemming from a compromise of a …

MatrixPDF Builder Turns Benign PDFs into Click‑Through Phishing Lures That Bypass Gmail Filters
CyberSecureFox 🦊
Varonis researchers have identified MatrixPDF, a commercial builder that converts legitimate PDF files into interactive …

Unity CVE-2025-59489: Critical Runtime Flaw Enables Code Execution on Android and Potential Privilege Escalation on Windows
CyberSecureFox 🦊
A high-severity vulnerability in the Unity Runtime, tracked as CVE-2025-59489 with a CVSS score of …

Red Hat probes consulting GitLab breach as Crimson Collective claims 570 GB data theft and 800 CERs exposed
CyberSecureFox 🦊
Ransomware group Crimson Collective claims it stole 570 GB of data from about 28,000 internal …