Extended Data Exposure Incident Highlights Growing Risks in Financial Platforms

Engaging YouTube Financial Security Banner

A recent security incident involving PayPal has brought renewed attention to data protection challenges within digital financial ecosystems. Reports indicate that sensitive customer information, including Social Security Numbers and business-related personally identifiable information, remained exposed for more than six months before being identified and addressed. The exposure reportedly stemmed from weaknesses in account access controls and data […]

OpenClaw Malware Campaign Compromises 1,184 Software Packages and Steals SSH Keys

OpenClaw Malware Campaign Digital Banner 3

A recent supply chain attack uncovered a sophisticated malware operation linked to OpenClaw, exposing how open source ecosystems are increasingly becoming high value targets for cybercriminals. The campaign embedded malicious code across 1,184 software packages, enabling attackers to steal SSH keys and establish reverse shell access to compromised systems. Understanding the Threat The malicious packages were […]

PromptSpy: The Rise of AI Powered Android Malware and What It Means for Cybersecurity

YouTube Banner with Glitch Effects

The cybersecurity landscape continues to evolve as attackers begin integrating artificial intelligence into malware operations. A newly discovered Android threat known as PromptSpy marks a significant shift, becoming one of the first known malware families to leverage AI driven decision making through Google’s Gemini capabilities. This development signals a new phase where malicious software can adapt, analyze, […]

Critical Authentication Bypass Vulnerability in better auth API Keys Plugin Enables Unauthorized Account Takeover

Cracked Lock with Hackers Hand

A newly disclosed security vulnerability affecting the better auth API Keys plugin has raised serious concerns across the developer and enterprise security community. The flaw allows attackers to bypass authentication controls, potentially enabling unauthorized account access without valid credentials. Authentication mechanisms form the foundation of application security. When these controls fail, attackers can gain direct […]

Phantom Stealer Campaign Abuses ISO Mounting to Compromise Windows Systems

Phantom

A new phishing campaign is actively targeting Windows environments using malicious ISO files as the primary delivery vector. The operation deploys Phantom Stealer, a highly capable information stealing malware designed for credential theft, financial fraud and silent persistence. This activity is not random. The campaign is organized, intentional and operationally mature, with a clear focus on finance […]

Apple Patches Two WebKit Zero Days Actively Exploited in Sophisticated Attacks

vulnerability Webkit

Apple has released emergency security updates across its entire ecosystem after confirming that two WebKit vulnerabilities were actively exploited in highly targeted attacks. These flaws impacted any Apple device rendering web content, including Safari and every browser on iOS and iPadOS. Anyone running an unpatched device was at risk. The Vulnerabilities Explained Apple addressed two […]

Shai-Hulud Worm Rises Again: A Supply-Chain Threat That Just Got Worse

Shai Hulud

A menacing piece of self-replicating malware known as the Shai-Hulud worm has re-emerged, and this time its reach is more destructive than ever. First seen earlier this year in NPM packages, the worm now appears in a stronger variant that runs malicious code even before installation finishes, dramatically widening its potential impact. Researchers at Wiz have discovered […]

AI Clusters Hijacked: How ShadowRay 2.0 Transforms Ray Infrastructure Into a Global Crypto Botnet

ShadowRay

A critical security campaign called ShadowRay 2.0 is turning exposed AI infrastructure into a crypto-mining nightmare. Attackers are exploiting a long-known, but persistently unpatched, vulnerability in the open-source Ray framework, weaponizing AI clusters especially those with NVIDIAGPUs for self-replicating cryptojacking and broader malicious activity. What Is ShadowRay 2.0 The root issue is CVE-2023–48022, a high-severity bug (CVSS 9.8) […]

Wireshark Crash Risk: Malformed Packets Expose Network Analyzer to Denial-of-Service

Wireshark Crash Risk Malformed Packets Expose Network Analyzer to Denial of Service

Wireshark, the widely used network protocol analyzer, is facing renewed scrutiny after serious vulnerabilities were highlighted in recent versions. Attackers can crash the application by sending specially crafted malformed packets or by tricking users into opening malicious capture files. What’s Going On · A critical buffer-handling bug (tracked as CVE-2025–5601) affects several Wireshark versions (notably 4.4.0 […]

Fake Job Platforms Targeting AI Developers Are Becoming a New Threat

Dystopian Control Room AI Job Threat Representation

A growing threat is targeting AI developers in the United States, and it is taking the form of fake job platforms operated by North Korean groups. These platforms are designed to look legitimate. They promise work opportunities, freelance projects and attractive remote roles. Behind the scenes, attackers use these interactions to gather sensitive information, gain […]