Android NFC Malware Targets Contactless Payments: HCE Abuse and APDU Tunneling Drive Fraud

Man in suit examines smartphone displaying NFC above a credit card.

Researchers at Zimperium report a sharp rise in Android malware aimed at contactless payments across Eastern Europe. More than 760 NFC-focused samples have been identified in recent months, with threat actors abusing legitimate Android mechanisms to skim payment data and execute unauthorized transactions. The attack tempo is not slowing; it is accelerating, making mobile tap-to-pay … Read more

PhantomRaven: npm malware campaign exploits Remote Dynamic Dependencies to evade detection

User on a computer left vs. a hooded figure on the right, symbolizing cybersecurity threats.

Security researchers at Koi Security report a protracted npm supply chain operation dubbed PhantomRaven that has uploaded 126 malicious packages since August 2024, accumulating more than 86,000 downloads. At the time of their publication, roughly 80 packages were still active. The campaign’s defining feature is its use of Remote Dynamic Dependencies (RDD)—a technique that fetches … Read more

CSRF + Persistent Memory Flaw Exposes ChatGPT Atlas to Stealthy Prompt Injection

Billboard featuring "ChatGPT ATLAs" overlooking a river and cityscape.

Security researchers at LayerX have identified a vulnerability in OpenAI’s new ChatGPT Atlas browser that combines Cross-Site Request Forgery (CSRF) with the product’s persistent memory. The issue allows an attacker to plant hidden, durable instructions into the AI assistant’s memory, enabling unintended actions that persist across sessions and devices. According to LayerX, the impact ranges … Read more

Ransomware Payments Fall to Record Low as Data-Theft Extortion Dominates

Rusty padlock and wax seal on dollar bills, symbolizing security and wealth.

According to Coveware’s latest Q3 2025 ransomware report, the share of organizations that pay after an incident has fallen to a historic low. Only 23% of victims paid a ransom, down from 28% in early 2024. The average payment dropped to $377,000, and the median fell to $140,000, extending a six-year decline in both payment … Read more

LastPass “Emergency Access” Phishing Targets Master Passwords and Passkeys

Chameleon on a padlock beside a laptop with a security warning displayed.

Users of the LastPass password manager are being hit by a large‑scale phishing wave that began in mid‑October 2025. The lure impersonates LastPass’s Emergency Access feature to create urgency around a supposed inheritance scenario, pushing victims to “cancel” a fabricated request and, in the process, surrender credentials on a spoofed site. How the phishing works: … Read more

WordPress Under Attack: Mass Exploitation of GutenKit and Hunk Companion REST API RCE Flaws

Hooded figure at a laptop with WordPress and plugin icons against a dark backdrop.

Wordfence has observed a large-scale, automated campaign abusing critical vulnerabilities in the WordPress plugins GutenKit and Hunk Companion. Over a two-day window, the company’s web application firewall blocked approximately 8.7 million malicious requests, indicating broad, scripted exploitation against unpatched sites. Critical CVEs: Unauthenticated REST API to Remote Code Execution The threat actors are chaining three … Read more

CVE-2025-11705 in Anti‑Malware Security WordPress Plugin Enables Authenticated Arbitrary File Read

Man anxiously looks at a laptop displaying an anti-malware alert.

A high‑impact vulnerability, CVE-2025-11705, has been identified in the popular WordPress plugin Anti‑Malware Security and Brute‑Force Firewall, enabling authenticated users with minimal privileges to read arbitrary files on the server. The plugin is installed on more than 100,000 sites. At the time of writing, only about half of those sites are reported to have applied … Read more

Mozilla to Require Data Collection Disclosures for Firefox Extensions

Hand holding a fiery orb balances against a stack of mysterious papers.

Mozilla is introducing mandatory data collection disclosures for Firefox extensions, aiming to strengthen transparency and user control. The new requirements activate on November 3, 2025, with full enforcement across the add-on ecosystem in the first half of 2026. This change affects how developers declare the types of data their extensions access and how users grant … Read more

Microsoft patches critical WSUS RCE (CVE-2025-59287) amid active exploitation

Building with flaming rooftop labeled "Windows Server" amidst suburban offices.

Microsoft has released out-of-band security updates to address a critical flaw in Windows Server Update Services (WSUS), tracked as CVE-2025-59287. The vulnerability enables unauthenticated remote code execution (RCE) with SYSTEM-level privileges. A public proof-of-concept (PoC) already exists, and security firms report early signs of exploitation in the wild, elevating patch urgency for organizations relying on … Read more

BlueNoroff’s GhostCall and GhostHire: macOS-focused campaigns hitting crypto and Web3 firms

Businessman in suit appears troubled, surrounded by digital symbols and a hooded figure.

Kaspersky researchers have identified two coordinated BlueNoroff operations—GhostCall and GhostHire—active since April 2025 and aimed primarily at cryptocurrency and Web3 companies in India, Turkey, Australia, and multiple countries across Europe and Asia. The threat actor blends persuasive social engineering with multi‑stage delivery chains to compromise macOS endpoints and exfiltrate digital assets and credentials. BlueNoroff’s evolution: … Read more