HashiCorp has recently identified and disclosed two significant security vulnerabilities within its Vault software, a widely utilized tool for secrets management, encryption, and identity-based access. […]
Year: 2025
Chrome Zero-Day Vulnerability Exploited by Mem3nt0 Mori Hacker Group
In March 2025, cybersecurity researchers from Kaspersky identified a critical zero-day vulnerability in Google Chrome, designated as CVE-2025-2783. This flaw was actively exploited by the […]
Hackers Actively Exploiting WordPress Plugin Vulnerabilities to Install Malicious Software
In October 2025, cybersecurity analysts identified a significant exploitation campaign targeting critical vulnerabilities in two widely used WordPress plugins: GutenKit and Hunk Companion. These vulnerabilities, […]
North Korean Chollima Group Enhances Cyber Arsenal with BeaverTail and OtterCookie Malware
The North Korean cyber threat group known as Famous Chollima, affiliated with the country’s Reconnaissance General Bureau, has significantly advanced its cyber capabilities by integrating […]
Qilin Ransomware Exploits MSPaint and Notepad for Targeted Data Theft
In the latter half of 2025, the Qilin ransomware group has emerged as a formidable cyber threat, disclosing over 40 victims monthly on its public […]
Microsoft Teams Text-to-Speech Glitch Disrupts Auto-Attendant Calls
On October 27, 2025, Microsoft acknowledged a malfunction within its Teams platform affecting the text-to-speech (TTS) functionality during auto-attendant calls. This issue has led to […]
Predatory Sparrow: A Cyber Sabotage Group Targeting Middle Eastern Critical Infrastructure
Predatory Sparrow has emerged as a formidable cyber-sabotage group, focusing its operations on critical infrastructure within the Middle East, particularly in Iran and Syria. Believed […]
Critical Vulnerability in OpenAI’s ChatGPT Atlas Browser Enables Malicious Code Injection
A significant security flaw has been identified in OpenAI’s recently launched ChatGPT Atlas browser, allowing attackers to inject harmful instructions into ChatGPT’s memory and execute […]
iOS 26 Update Compromises Forensic Detection of Pegasus and Predator Spyware
The advent of sophisticated spyware such as Pegasus and Predator has significantly altered the landscape of mobile device security. These advanced malware strains, utilized by […]
Critical Vulnerability in Ubiquiti UniFi Access Application Exposes Door Control Systems to Unauthorized Access
A significant security flaw has been identified in Ubiquiti’s UniFi Access application, potentially compromising the integrity of physical security systems. This vulnerability, discovered by Catchify […]