Cybersecurity News

Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.

Tense scene of two men in a dimly lit room focused on a computer screen.

Tsundere Web3 Botnet Abuses Ethereum Smart Contracts to Control Windows Infections

CyberSecureFox 🦊

A newly identified Windows botnet dubbed Tsundere is demonstrating how quickly cybercriminals are adopting Web3 technologies. The malware masquerades as ...

Close-up of a textured surface featuring "www." and a hashtag symbol.

HashJack Attack: How URL Fragments Turn AI Browser Assistants into a New Attack Surface

CyberSecureFox 🦊

The rapid integration of AI assistants into web browsers — from Copilot in Microsoft Edge and Gemini in Google Chrome ...

A woman faces holographic screens displaying two men and their prison sentences.

Samourai Wallet Founders Sentenced: Impact on Bitcoin Mixers, Crypto Privacy and AML Compliance

CyberSecureFox 🦊

The founders of Samourai Wallet and its integrated bitcoin mixing service Whirlpool have received prison sentences in the United States, ...

Aerial view of a large, historic government building surrounded by the cityscape.

Tomiris APT Targets Russian and CIS Diplomatic Missions With New Cyber‑Espionage Wave in 2025

CyberSecureFox 🦊

Since the beginning of 2025, researchers from Kaspersky have observed a new wave of targeted cyber‑espionage operations by the Tomiris ...

Giant robot emerges from a cracked laptop displaying AI and API icons.

Critical MCP Vulnerability in Perplexity’s Comet AI Browser Sparks Security Debate

CyberSecureFox 🦊

Security researchers at SquareX have disclosed a critical vulnerability in the Comet AI browser by Perplexity, linked to a poorly ...

Man in a suit examines a box of tech items and a smartphone, looking concerned.

GrapheneOS Pulls Infrastructure Out of France Over Encryption Regulation Concerns

CyberSecureFox 🦊

The team behind GrapheneOS, one of the most prominent privacy‑ and security‑focused Android forks, is fully withdrawing its infrastructure from ...

Mysterious hooded figure working on a laptop in a dimly lit room.

PlushDaemon: How Router Hijacking Turns Software Updates into a Cyber‑Espionage Weapon

CyberSecureFox 🦊

A newly documented cyber‑espionage campaign known as PlushDaemon demonstrates how attackers can abuse trusted software update mechanisms by first compromising ...

Green skull with tentacles looms over a hacker working on a laptop amidst floating documents.

Criminal LLMs: How WormGPT 4 and KawaiiGPT Turn Generative AI into a Cybercrime Tool

CyberSecureFox 🦊

Generative AI is no longer just a productivity tool for developers and enterprises. In parallel to legitimate platforms, an underground ...

Individual detects malware in a high-tech cybersecurity environment.

Bloody Wolf Expands Targeted Cyber Attacks Across Central Asia with NetSupport RAT

CyberSecureFox 🦊

A cybercrime group known as Bloody Wolf has launched a new wave of targeted attacks against organizations in Central Asia, ...

Sign with a purple onion logo by a river with a cityscape in the background.

Tor Project Deploys Counter Galois Onion (CGO) to Upgrade Traffic Encryption

CyberSecureFox 🦊

The Tor Project is rolling out a new traffic encryption algorithm, Counter Galois Onion (CGO), designed to replace its legacy ...