Cybersecurity News

Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.

Satellite dishes overlooking a coastal cityscape under a partly cloudy sky.

Unencrypted GEO Satellite Backhaul Exposes Calls, Aviation Wi‑Fi, and Critical Infrastructure Data

CyberSecureFox 🦊

Researchers from the University of California San Diego and the University of Maryland report that a significant portion of geostationary ...

A man in a suit uses a laptop, contrasting with a hooded figure behind another laptop.

Storm-2657 Targets U.S. Universities to Hijack Payroll via HR SaaS and SSO Abuse

CyberSecureFox 🦊

Microsoft Threat Intelligence has linked a wave of account‑takeover campaigns against U.S. universities to the threat group Storm‑2657, active since ...

Busts of classical figures, a laptop, and a skull under moody lighting.

Google Won’t Patch ASCII Smuggling in Gemini: What It Means for LLM Security

CyberSecureFox 🦊

Google has declined to issue a fix for ASCII smuggling in Gemini, a technique that hides machine-readable instructions using Unicode ...

Man looks concerned as he holds a phone displaying a spyware installation screen.

ClayRat Android Spyware Targets Russian Users with Telegram Channels and Fake Play Pages

CyberSecureFox 🦊

Security researchers have documented a large-scale Android espionage operation in Russia that uses convincing social engineering, Telegram distribution, and a ...

Arduino board on the left, Qualcomm Snapdragon logo on the right against a dark background.

Qualcomm to Acquire Arduino: Implications for IoT, Edge AI, and Cybersecurity

CyberSecureFox 🦊

Qualcomm announced its intent to acquire Arduino, the open-source hardware and software ecosystem used by millions of developers worldwide. The ...

Hooded figure using a laptop with a Bitcoin logo, flanked by flames and a missile.

North Korean Crypto Theft Hits Record $2B in 2025: Elliptic Analysis and Security Guidance

CyberSecureFox 🦊

Blockchain analytics firm Elliptic estimates that North Korea–linked threat actors stole more than $2 billion in cryptocurrency during the first ...

Dark surreal scene with a chained cloud and a skull backdrop, evoking tension.

Salesforce Rejects Ransom Demands as Scattered Lapsus$ Hunters Threaten Mass Data Leak via OAuth Exploits

CyberSecureFox 🦊

Salesforce has notified customers it will not negotiate or pay ransom to the threat actors behind a wave of data ...

Hand installing RAM modules into a computer's motherboard, showcasing technology.

WireTap Attack Breaks Intel SGX DCAP Attestation with a Passive DDR4 Interposer

CyberSecureFox 🦊

Researchers from the Georgia Institute of Technology and Purdue University have introduced WireTap, a physical-layer attack that compromises Intel Software ...

Man working at a futuristic desk, analyzing data on a large screen.

Solar 4RAYS identifies new East Asian cluster NGC4141 exploiting API logic to compromise federal web app

CyberSecureFox 🦊

Solar 4RAYS has profiled a previously unidentified East Asian threat cluster, designated NGC4141, after the group compromised a federal agency’s ...

Scenic view of Brasil with mountains, bay, and a capybara near a signpost.

SORVEPOTEL Malware Abuses WhatsApp Web to Self‑Spread in Brazil

CyberSecureFox 🦊

Trend Micro has identified a rapid‑propagation Windows threat dubbed SORVEPOTEL that weaponizes WhatsApp Web to distribute itself at scale. The ...