Hacking

Play ransomware affiliate leveraged zero-day to deploy malwarePlay ransomware affiliate leveraged zero-day to deploy malware

Play ransomware affiliate leveraged zero-day to deploy malware

The Play ransomware gang exploited a high-severity Windows Common Log File System flaw in zero-day attacks to deploy malware. The Play…

1 week ago
Canary Exploit tool allows to find servers affected by Apache Parquet flawCanary Exploit tool allows to find servers affected by Apache Parquet flaw

Canary Exploit tool allows to find servers affected by Apache Parquet flaw

F5 Labs researchers released a PoC tool to find servers vulnerable to the Apache Parquet vulnerability CVE-2025-30065. A working proof-of-concept…

1 week ago
Unsophisticated cyber actors are targeting the U.S. Energy sectorUnsophisticated cyber actors are targeting the U.S. Energy sector

Unsophisticated cyber actors are targeting the U.S. Energy sector

CISA, FBI, EPA, and DoE warn of cyberattacks on the U.S. Energy sector carried out by unsophisticated cyber actors targeting…

1 week ago
NSO Group must pay WhatsApp over $167M in damages for attacks on its usersNSO Group must pay WhatsApp over $167M in damages for attacks on its users

NSO Group must pay WhatsApp over $167M in damages for attacks on its users

NSO Group must pay WhatsApp over $167M in damages for a 2019 hack targeting 1,400+ users, per U.S. jury ruling…

1 week ago
U.S. CISA adds FreeType flaw to its Known Exploited Vulnerabilities catalogU.S. CISA adds FreeType flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds FreeType flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds FreeType flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure…

1 week ago
Samsung MagicINFO flaw exploited days after PoC exploit publicationSamsung MagicINFO flaw exploited days after PoC exploit publication

Samsung MagicINFO flaw exploited days after PoC exploit publication

Threat actors started exploiting a vulnerability in Samsung MagicINFO only days after a PoC exploit was published. Arctic Wolf researchers…

1 week ago
Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324<gwmw style="display:none;"></gwmw>Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324<gwmw style="display:none;"></gwmw>

Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324<gwmw style="display:none;"></gwmw>

Threat actors launch second wave of attacks on SAP NetWeaver, exploiting webshells from a recent zero-day vulnerability. In April, ReliaQuest…

2 weeks ago
U.S. CISA adds Langflow flaw to its Known Exploited Vulnerabilities catalogU.S. CISA adds Langflow flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Langflow flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Langflow flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and…

2 weeks ago
Google fixed actively exploited Android flaw CVE-2025-27363Google fixed actively exploited Android flaw CVE-2025-27363

Google fixed actively exploited Android flaw CVE-2025-27363

Google addressed 46 Android security vulnerabilities, including one issue that has been exploited in attacks in the wild. Google's monthly…

2 weeks ago
New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDRNew ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR

New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR

A new BYOI technique lets attackers bypass SentinelOne EDR, disable protection, and deploy Babuk ransomware by exploiting the agent upgrade…

2 weeks ago