DarkSword iOS Exploit Kit: Safari-Based Spyware Threat Puts Millions of iPhones at Risk

Phone split into dark cybersecurity threats and bright digital solutions.

Security researchers from Lookout, iVerify and Google’s Threat Intelligence Group (GTIG) have uncovered a new advanced iOS exploit kit dubbed DarkSword. This browser-based attack chain targets iPhones running vulnerable builds of iOS 18.4–18.7 and can grant attackers full device compromise after a single visit to a malicious or compromised website in Safari. DarkSword exploit kit: … Read more

Magecart Attack via Favicon EXIF Metadata: Limits of Static Code Analysis and the Need for Client-Side Monitoring

Surreal split scene depicting a magnifying glass revealing a castle and a hacker manipulating data.

A recently observed Magecart web skimming campaign demonstrates how modern attackers can steal payment card data without ever modifying the target application’s source code. The malicious JavaScript payload is hidden inside the EXIF metadata of a dynamically loaded favicon and executed entirely in the shopper’s browser at checkout, rendering traditional repository and static code scanners … Read more

Custom Font Prompt Injection Attack Exposes Blind Spot in Browser-Based AI Assistants

Mysterious hacker working on a computer amidst cryptic code and eerie atmosphere.

Researchers from LayerX have presented a new prompt injection technique that targets browser-integrated AI assistants by abusing custom fonts. The method allows attackers to hide a malicious command in plain sight on a web page so that the human user sees the real, dangerous instruction, while the AI assistant only processes a harmless decoy. The … Read more

Apple Quietly Fixes Critical WebKit Vulnerability with Background Security Improvements

Panoramic view of San Francisco with Apple Park, Golden Gate Bridge, and wildflowers.

Apple has silently closed a critical browser engine vulnerability using its new Background Security Improvements (BSI) mechanism, delivering the patch to supported iPhone, iPad and Mac devices without requiring a full operating system update or reboot. The issue affected the WebKit engine used by Safari and all in-app browsers on Apple platforms, making rapid remediation … Read more

IP KVM Vulnerabilities Turn Low‑Cost Remote Management Into High‑Impact Attack Vector

Contrast between secure and compromised systems with tech elements and symbols.

Recent research by Eclypsium has revealed a cluster of nine security vulnerabilities in popular low‑cost IP KVM devices, priced roughly between 30 and 100 USD. These remote management tools operate at the BIOS/UEFI level, giving administrators full console access to servers before the operating system loads. In several cases, the flaws allow unauthenticated attackers to … Read more

CrackArmor: Nine Linux AppArmor Vulnerabilities Threaten Enterprise and Cloud Security

** Cybersecurity analysis scene with a woman and a man at high-tech workstations.

The Qualys Threat Research Unit (TRU) has disclosed nine vulnerabilities in the Linux kernel’s AppArmor security module, collectively dubbed CrackArmor. These flaws allow unprivileged users to bypass AppArmor protections, escalate privileges to root, and break container isolation, posing a significant risk to enterprise and cloud environments that rely on AppArmor as a core defense layer. … Read more

Japan Authorizes Offensive Cyber Operations from 2025: Shift to Proactive Cyber Defense

Tense scene with a leader watching soldiers operate amid chaos and explosions.

Japan has approved a landmark change to its national cybersecurity policy: from 1 October 2025, the Self-Defense Forces (SDF) and national police will be allowed to conduct offensive cyber operations against infrastructure used to launch attacks on Japanese targets. This move marks a transition from a purely defensive stance to a strategy of proactive cyber … Read more

How AI and SEO Bots Forced Digg to Hit Reset: Security Lessons for Social Platforms

Scene in a dystopian room with figures, machines, and a fiery skyline.

Digg, once a flagship of the early social web, has paused operations again — this time only two months after launching an open beta of its relaunched platform. The company has announced a “hard reset”: operations are frozen, staff cuts are planned, and the site has been deactivated. The primary trigger was a massive wave … Read more

Microsoft Exposes Storm-2561 Campaign Using Fake VPN Sites and Hyrax Infostealer

Two people focused on a laptop, displaying security software in a dark office setting.

Microsoft threat intelligence has identified a targeted campaign by the group Storm-2561 that abuses search engines and fake corporate VPN download pages to distribute the Hyrax infostealer. The operation specifically targets organizations relying on remote access solutions from Ivanti, Cisco, Fortinet and other major VPN and firewall vendors, putting corporate networks at risk of covert … Read more

Enterprise AI Security: Why Protection Lags Behind Adoption

Concerned professionals analyze AI security challenges in a tech environment.

Artificial intelligence is quickly becoming a core layer of enterprise infrastructure, yet its security posture is far behind its adoption curve. According to the AI and Adversarial Testing Benchmark Report 2026 by Pentera, most Chief Information Security Officers (CISOs) are trying to protect AI systems with legacy tools and methods that were never designed for … Read more