Tomiris APT Targets Russian and CIS Diplomatic Missions With New Cyber‑Espionage Wave in 2025

Aerial view of a large, historic government building surrounded by the cityscape.

Since the beginning of 2025, researchers from Kaspersky have observed a new wave of targeted cyber‑espionage operations by the Tomiris APT group against government institutions in Russia and several CIS countries. The campaign focuses primarily on ministries of foreign affairs and diplomatic missions, with the estimated number of affected users exceeding 1,000 accounts within a … Read more

Critical MCP Vulnerability in Perplexity’s Comet AI Browser Sparks Security Debate

Giant robot emerges from a cracked laptop displaying AI and API icons.

Security researchers at SquareX have disclosed a critical vulnerability in the Comet AI browser by Perplexity, linked to a poorly documented Model Context Protocol (MCP) API and hidden built‑in extensions. The flaw, now patched, could in theory enable command execution on a user’s machine outside the normal browser sandbox. While Perplexity has silently rolled out … Read more

GrapheneOS Pulls Infrastructure Out of France Over Encryption Regulation Concerns

Man in a suit examines a box of tech items and a smartphone, looking concerned.

The team behind GrapheneOS, one of the most prominent privacy‑ and security‑focused Android forks, is fully withdrawing its infrastructure from France and accelerating its exit from hosting provider OVH. The project attributes this move to what it describes as an increasingly hostile regulatory environment in France toward strong encryption and privacy-preserving services. Why GrapheneOS Is … Read more

PlushDaemon: How Router Hijacking Turns Software Updates into a Cyber‑Espionage Weapon

Mysterious hooded figure working on a laptop in a dimly lit room.

A newly documented cyber‑espionage campaign known as PlushDaemon demonstrates how attackers can abuse trusted software update mechanisms by first compromising routers and then hijacking update traffic. According to new research from ESET, the group uses a custom toolset, including the EdgeStepper malware, to silently redirect update requests and deliver backdoors instead of legitimate patches. PlushDaemon … Read more

Criminal LLMs: How WormGPT 4 and KawaiiGPT Turn Generative AI into a Cybercrime Tool

Green skull with tentacles looms over a hacker working on a laptop amidst floating documents.

Generative AI is no longer just a productivity tool for developers and enterprises. In parallel to legitimate platforms, an underground ecosystem of large language models (LLMs) purposely trained and configured for cybercrime is rapidly emerging. Recent research by Palo Alto Networks into two such models — the commercial WormGPT 4 and the free KawaiiGPT — … Read more

Bloody Wolf Expands Targeted Cyber Attacks Across Central Asia with NetSupport RAT

Individual detects malware in a high-tech cybersecurity environment.

A cybercrime group known as Bloody Wolf has launched a new wave of targeted attacks against organizations in Central Asia, focusing on Kyrgyzstan and Uzbekistan. Since June 2025, the group has been actively compromising financial institutions, government agencies and IT companies, turning a regional threat into a significant security concern for the wider Central Asian … Read more

Tor Project Deploys Counter Galois Onion (CGO) to Upgrade Traffic Encryption

Sign with a purple onion logo by a river with a cityscape in the background.

The Tor Project is rolling out a new traffic encryption algorithm, Counter Galois Onion (CGO), designed to replace its legacy tor1 scheme. This upgrade aims to improve user anonymity, strengthen resistance to traffic manipulation and correlation, and align the Tor protocol with modern cryptographic best practices. Why the Tor network is moving away from the … Read more

StealC V2 Infostealer Distributed via Malicious Blender .blend Files on 3D Marketplaces

Person interacting with holographic displays of programming concepts in a futuristic room.

Security researchers at Morphisec have identified a targeted malware campaign that abuses Blender, a popular open-source 3D creation suite, to deliver the StealC V2 infostealer. Attackers upload infected .blend project files to major 3D asset marketplaces such as CGTrader, putting freelance artists, studios, and production pipelines at risk whenever they download third‑party models. How malicious … Read more

Forced Keenetic Router Firmware Update: Critical CWE‑521 Password Vulnerability Explained

Router with screens displaying warning and upload symbols in contrasting colors.

Owners of Keenetic routers have reported that their devices upgraded to a new firmware version even though automatic updates were disabled. Keenetic representatives confirmed a forced KeeneticOS firmware update, explaining that it was triggered by a critical security vulnerability affecting the protection of home and office networks. Critical KeeneticOS Vulnerability: CWE‑521 Weak Password Requirements In … Read more

Google patches actively exploited Chrome zero‑day CVE-2025-13223 in V8 and WebAssembly

Man worriedly reading about critical vulnerability on a laptop.

Google has released an emergency security update for Google Chrome to fix CVE-2025-13223, a critical zero-day vulnerability rated 8.8 on the CVSS scale. The flaw has already been used in real-world attacks, making it the seventh actively exploited Chrome zero‑day in 2025 and reinforcing the browser’s status as a prime target for advanced threat actors. … Read more