information security news

China-linked APT Mustang Panda upgrades tools in its arsenalChina-linked APT Mustang Panda upgrades tools in its arsenal

China-linked APT Mustang Panda upgrades tools in its arsenal

China-linked APT group Mustang Panda deployed a new custom backdoor, MQsTTang, in recent attacks targeting Europe, Asia, and Australia. China-linked…

3 weeks ago
Node.js malvertising campaign targets crypto users<gwmw style="display: none; background-color: transparent;"></gwmw>Node.js malvertising campaign targets crypto users<gwmw style="display: none; background-color: transparent;"></gwmw>

Node.js malvertising campaign targets crypto users<gwmw style="display: none; background-color: transparent;"></gwmw>

Microsoft warns of a malvertising campaign using Node.js to deliver info-stealing malware via fake crypto trading sites like Binance and…

3 weeks ago
Apple released emergency updates for actively exploited flawsApple released emergency updates for actively exploited flaws

Apple released emergency updates for actively exploited flaws

Apple released emergency updates to fix iOS, iPadOS & macOS vulnerabilities actively exploited in sophisticated attacks. Apple released out‑of‑band security…

3 weeks ago
CISA’s 11-Month extension ensures continuity of MITRE’s CVE ProgramCISA’s 11-Month extension ensures continuity of MITRE’s CVE Program

CISA’s 11-Month extension ensures continuity of MITRE’s CVE Program

MITRE’s U.S.-funded CVE program, a core cybersecurity tool for tracking vulnerabilities, faces funding expiry Wednesday, risking disruption to global security.…

3 weeks ago
Chinese Android phones shipped with malware-laced WhatsApp, Telegram appsChinese Android phones shipped with malware-laced WhatsApp, Telegram apps

Chinese Android phones shipped with malware-laced WhatsApp, Telegram apps

Cheap Chinese Android phones ship with trojanized WhatsApp and Telegram clones hiding crypto clippers, active since June 2024. Since June…

3 weeks ago
Cyber Threats Against Energy Sector Surge as Global Tensions MountCyber Threats Against Energy Sector Surge as Global Tensions Mount

Cyber Threats Against Energy Sector Surge as Global Tensions Mount

Resecurity warns of rising cyberattacks on the energy sector, some linked to large-scale campaigns targeting national infrastructure for geopolitical aims.…

3 weeks ago
Critical Apache Roller flaw allows to retain unauthorized access even after a password changeCritical Apache Roller flaw allows to retain unauthorized access even after a password change

Critical Apache Roller flaw allows to retain unauthorized access even after a password change

A critical flaw (CVE-2025-24859, CVSS 10) in Apache Roller lets attackers keep access even after password changes. All versions ≤6.1.4…

3 weeks ago
Meta will use public EU user data to train its AI modelsMeta will use public EU user data to train its AI models

Meta will use public EU user data to train its AI models

Meta announced that it will use public EU user data to train AI, resuming plans paused last year over Irish…

3 weeks ago
Hertz disclosed a data breach following 2024 Cleo zero-day attackHertz disclosed a data breach following 2024 Cleo zero-day attack

Hertz disclosed a data breach following 2024 Cleo zero-day attack

Hertz Corporation disclosed a data breach after customer data was stolen via Cleo zero-day exploits in late 2024, affecting Hertz,…

3 weeks ago
Gladinet flaw CVE-2025-30406 actively exploited in the wildGladinet flaw CVE-2025-30406 actively exploited in the wild

Gladinet flaw CVE-2025-30406 actively exploited in the wild

Huntress reports active exploitation of Gladinet CVE-2025-30406 in the wild, affecting seven organizations and 120 endpoints. Security researchers at Huntress…

3 weeks ago