Cybersecurity News
Stay up-to-date with the latest cybersecurity news and developments in the cybersecurity landscape. Be the first to know about the latest threats, current innovations, and major trends in the cyber universe. Check our Cyber News section for the freshest information.
Google patches actively exploited Chrome zero‑day CVE-2025-13223 in V8 and WebAssembly
Google has released an emergency security update for Google Chrome to fix CVE-2025-13223, a critical zero-day vulnerability rated 8.8 on ...
Malicious npm Packages Abuse Adspect Cloaking to Deliver Crypto Scams
Researchers at Socket have identified seven malicious npm packages that weaponized the cloud-based traffic service Adspect to hide their behavior ...
ShadowRay 2.0 Exploits CVE-2023-48022 in Ray to Build Self-Spreading AI Botnet
Attackers are actively abusing a critical remote code execution (RCE) vulnerability CVE-2023-48022 in the popular Ray framework to hijack artificial ...
WrtHug Malware Campaign Hijacks Asus Routers Through AiCloud Vulnerabilities
SecurityScorecard researchers have disclosed a large-scale malware operation dubbed WrtHug, targeting consumer and SOHO Asus routers. The campaign has already ...
Chinese APT24 Uses New BadAudio Malware in Multi‑Year Cyber Espionage Campaign
Google Threat Intelligence Group (GTIG) has detailed a multi‑year cyber espionage operation attributed to the Chinese threat actor APT24 (also ...
Microsoft to Integrate Sysmon Natively into Windows 11 and Windows Server 2025
Microsoft has announced plans to add Sysmon (System Monitor) as a native, installable component in Windows 11 and Windows Server ...
CrowdStrike Insider Leak Exposes SSO Risks and the Evolving Insider Threat Landscape
In the second half of last month, CrowdStrike, one of the leading global cybersecurity vendors, confirmed an insider-driven data leak ...
CVE-2025-41115: Critical SCIM Vulnerability in Grafana Enterprise Enables Admin Account Takeover
A critical security flaw tracked as CVE-2025-41115 has been discovered in the commercial edition of Grafana Enterprise, scoring the maximum ...
Unpatched D-Link DIR-878 Vulnerabilities Put Home and Office Routers at Risk
The popular dual-band router D-Link DIR-878, widely used in homes and small offices, has been found to contain several serious ...
Microsoft Shuts Down KMS38 Offline Activation: Security and Compliance Implications for Windows Environments
Microsoft has effectively shut down one of the most widely used illicit activation methods for Windows—KMS38. Users report that the ...