OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has…
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of…
Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
Oct 01, 2025Ravie LakshmananVulnerability / Malware Unknown threat actors are abusing Milesight…
$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
A group of academics from KU Leuven and the University of Birmingham…
New China-Linked Hacker Group Hits Governments With Stealth Malware
Sep 30, 2025Ravie LakshmananCyber Espionage / Malware Government and telecommunications organizations across…
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
Sep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security…
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools…
Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network
Sep 25, 2025Ravie LakshmananMalvertising / Threat Intelligence The threat actor known as…
Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware
The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors…


