Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
DarkSword iOS Exploit Kit: Safari-Based Spyware Threat Puts Millions of iPhones at Risk
Security researchers from Lookout, iVerify and Google’s Threat Intelligence Group (GTIG) have uncovered a new advanced iOS exploit kit dubbed ...
Magecart Attack via Favicon EXIF Metadata: Limits of Static Code Analysis and the Need for Client-Side Monitoring
A recently observed Magecart web skimming campaign demonstrates how modern attackers can steal payment card data without ever modifying the ...
Custom Font Prompt Injection Attack Exposes Blind Spot in Browser-Based AI Assistants
Researchers from LayerX have presented a new prompt injection technique that targets browser-integrated AI assistants by abusing custom fonts. The ...
Apple Quietly Fixes Critical WebKit Vulnerability with Background Security Improvements
Apple has silently closed a critical browser engine vulnerability using its new Background Security Improvements (BSI) mechanism, delivering the patch ...
IP KVM Vulnerabilities Turn Low‑Cost Remote Management Into High‑Impact Attack Vector
Recent research by Eclypsium has revealed a cluster of nine security vulnerabilities in popular low‑cost IP KVM devices, priced roughly ...
CrackArmor: Nine Linux AppArmor Vulnerabilities Threaten Enterprise and Cloud Security
The Qualys Threat Research Unit (TRU) has disclosed nine vulnerabilities in the Linux kernel’s AppArmor security module, collectively dubbed CrackArmor. ...
Japan Authorizes Offensive Cyber Operations from 2025: Shift to Proactive Cyber Defense
Japan has approved a landmark change to its national cybersecurity policy: from 1 October 2025, the Self-Defense Forces (SDF) and ...
How AI and SEO Bots Forced Digg to Hit Reset: Security Lessons for Social Platforms
Digg, once a flagship of the early social web, has paused operations again — this time only two months after ...
Microsoft Exposes Storm-2561 Campaign Using Fake VPN Sites and Hyrax Infostealer
Microsoft threat intelligence has identified a targeted campaign by the group Storm-2561 that abuses search engines and fake corporate VPN ...
Enterprise AI Security: Why Protection Lags Behind Adoption
Artificial intelligence is quickly becoming a core layer of enterprise infrastructure, yet its security posture is far behind its adoption ...