Cybersecurity News

Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.

Mysterious hooded figure working on a laptop in a dimly lit room.

PlushDaemon: How Router Hijacking Turns Software Updates into a Cyber‑Espionage Weapon

CyberSecureFox 🦊

A newly documented cyber‑espionage campaign known as PlushDaemon demonstrates how attackers can abuse trusted software update mechanisms by first compromising ...

Green skull with tentacles looms over a hacker working on a laptop amidst floating documents.

Criminal LLMs: How WormGPT 4 and KawaiiGPT Turn Generative AI into a Cybercrime Tool

CyberSecureFox 🦊

Generative AI is no longer just a productivity tool for developers and enterprises. In parallel to legitimate platforms, an underground ...

Individual detects malware in a high-tech cybersecurity environment.

Bloody Wolf Expands Targeted Cyber Attacks Across Central Asia with NetSupport RAT

CyberSecureFox 🦊

A cybercrime group known as Bloody Wolf has launched a new wave of targeted attacks against organizations in Central Asia, ...

Sign with a purple onion logo by a river with a cityscape in the background.

Tor Project Deploys Counter Galois Onion (CGO) to Upgrade Traffic Encryption

CyberSecureFox 🦊

The Tor Project is rolling out a new traffic encryption algorithm, Counter Galois Onion (CGO), designed to replace its legacy ...

Person interacting with holographic displays of programming concepts in a futuristic room.

StealC V2 Infostealer Distributed via Malicious Blender .blend Files on 3D Marketplaces

CyberSecureFox 🦊

Security researchers at Morphisec have identified a targeted malware campaign that abuses Blender, a popular open-source 3D creation suite, to ...

Router with screens displaying warning and upload symbols in contrasting colors.

Forced Keenetic Router Firmware Update: Critical CWE‑521 Password Vulnerability Explained

CyberSecureFox 🦊

Owners of Keenetic routers have reported that their devices upgraded to a new firmware version even though automatic updates were ...

Man worriedly reading about critical vulnerability on a laptop.

Google patches actively exploited Chrome zero‑day CVE-2025-13223 in V8 and WebAssembly

CyberSecureFox 🦊

Google has released an emergency security update for Google Chrome to fix CVE-2025-13223, a critical zero-day vulnerability rated 8.8 on ...

Brown bear walking near a river with a cityscape and mountains in the background.

Malicious npm Packages Abuse Adspect Cloaking to Deliver Crypto Scams

CyberSecureFox 🦊

Researchers at Socket have identified seven malicious npm packages that weaponized the cloud-based traffic service Adspect to hide their behavior ...

Hooded figure stands before a glowing skull sign in a dark, urban landscape.

ShadowRay 2.0 Exploits CVE-2023-48022 in Ray to Build Self-Spreading AI Botnet

CyberSecureFox 🦊

Attackers are actively abusing a critical remote code execution (RCE) vulnerability CVE-2023-48022 in the popular Ray framework to hijack artificial ...

Modern tech scene with a man interacting with a digital display in a futuristic setting.

WrtHug Malware Campaign Hijacks Asus Routers Through AiCloud Vulnerabilities

CyberSecureFox 🦊

SecurityScorecard researchers have disclosed a large-scale malware operation dubbed WrtHug, targeting consumer and SOHO Asus routers. The campaign has already ...