November 20, 2025 No Comments New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
November 20, 2025 No Comments Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
November 20, 2025 No Comments TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
November 19, 2025 No Comments Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
November 19, 2025 No Comments Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
November 19, 2025 No Comments WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
November 19, 2025 No Comments Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
November 19, 2025 No Comments EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
November 19, 2025 No Comments ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts