ChatGPT Atlas Vulnerability

Screenshot 2025 10 25 223223

A new security concern has surfaced around ChatGPT Atlas, a macOS browser that enables access to OpenAI’s ChatGPT models. Researchers have revealed that OAuth tokens-used for authenticating users-were stored in plain text inside a local SQLite database. This flaw could allow attackers or malicious local processes to hijack user accounts and access private conversations, API […]

WhatsApp Zero-Click Flaw

Screenshot 2025 10 25 222809

At Pwn2Own Ireland 2025, researchers discovered a potential zero-click remote code execution vulnerability affecting WhatsApp. The research team chose to withdraw their on-stage demonstration and instead privately disclose the issue to Meta through a coordinated process designed to give the vendor time to investigate and patch. The decision prioritizes responsible disclosure and reduces the chance […]

Jira Software Vulnerability

Screenshot 2025 10 25 180555

A high-severity path traversal vulnerability (CVE‑2025‑22167) affecting Jira Software Data Center and Server has been disclosed. The flaw allows authenticated users (with low privilege) to write files to any path on the host that the JVM process can access, posing serious risks of tampering, remote code execution or data corruption. What the Vulnerability Does The […]

Magento Stores Hit by Active RCE Exploit

YouTube Banner Magento RCE Crisis Three in Five Stores Vulnerable

Security researchers identified SessionReaper as an improper input validation / nested deserialization weakness in the Commerce REST API that allows unauthenticated actors to take over sessions and execute code. Proofs of concept and working exploit tools have proliferated, and automated scanning is finding thousands of vulnerable instances. Industry telemetry shows large-scale attack attempts, webshell drops, […]

Hackers Exploit ASP.NET

Moody Server Room Banner

Cybersecurity researchers have uncovered a large-scale attack campaign where hackers are abusing ASP.NET machine keys to compromise Microsoft Internet Information Services (IIS) servers. This new wave of intrusions, attributed to the threat group REF3927, leverages publicly exposed or leaked machine keys to generate malicious ViewState payloads capable of remote code execution. The ongoing exploitation underscores […]

GlassWorm: Invisible Code, Visible Damage

YouTube Banner glassWorm Security Threats

A new, highly sophisticated worm called GlassWorm is spreading through Visual Studio Code extensions on OpenVSX and other registries, and it is changing the rules for supply-chain security. Researchers at Koi Security first flagged the campaign after seeing extensions behave normally in code reviews but perform malicious actions at runtime. The worm uses invisible Unicode […]

Assault on AI Assistants

YouTube Banner Microsoft 365 Copilot Vulnerability Exposed

A newly discovered vulnerability in Microsoft 365 Copilot allows attackers to extract sensitive tenant data-such as recent emails-via an indirect prompt injection attack embedded within everyday Office documents. This incident highlights the growing complexity of securing AI-powered systems and the urgent need to treat them like any other enterprise attack surface. How the Attack Works […]

Ethereum transaction

Screenshot 2025 10 17 214314

Security researchers have exposed a new laundering technique used by North Korean threat actors: EtherHiding. This scheme conceals blockchain-based infrastructure behind onion domains and delivers infrastructure updates via cleverly encoded Ethereum transactions. By embedding configuration commands within seemingly benign smart contract interactions, attackers avoid detection and complicate takedown efforts. How EtherHiding Works Infrastructure setup: The […]

Over 269,000 F5 Devices Exposed

Screenshot 2025 10 17 201449

A recent study found that more than 269,000 F5 devices (load balancers, application delivery controllers, SSL/TLS proxies, etc.) are exposed on the public internet – many with misconfigurations, default settings, or known vulnerabilities. This situation presents a sizable risk: as gateway appliances, exposed F5 systems can become a primary route for attackers to intercept, manipulate, […]

Qilin Ransomware’s New Tactic

Screenshot 2025 10 16 225905

In recent months, the Qilin ransomware group has evolved its operations to rely heavily on ghost bulletproof hosting-a resilient infrastructure built to resist takedown efforts and evade attribution. This development marks a shift in RaaS (Ransomware as a Service) strategy, enabling Qilin to sustain extortion campaigns with much greater persistence. What’s different this time? Bulletproof […]