Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation
Nov 07, 2025Ravie LakshmananSupply Chain Attack / Malware A set of nine…
Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
Nov 07, 2025Ravie LakshmananMobile Security / Vulnerability A now-patched security flaw in…
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting…
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension…
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine
Nov 06, 2025Ravie LakshmananMalware / Vulnerability A previously unknown threat activity cluster…
Building Cyber Resilience in Financial Services
Introduction Financial institutions are facing a new reality: cyber-resilience has passed from…
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
Nov 05, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed a…
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
Nov 05, 2025Ravie LakshmananArtificial Intelligence / Threat Intelligence Google on Wednesday said…
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
Nov 05, 2025Ravie LakshmananCybersecurity / Cyber Espionage A never-before-seen threat activity cluster…


