The Pwn2Own Ireland 2025 competition concluded with security researchers identifying 73 unique zero-day vulnerabilities across a diverse array of devices, culminating in a total of […]
Year: 2025
Sophisticated Spearphishing Campaign Targets Humanitarian Organizations with Weaponized PDFs
In early October 2025, cybersecurity researchers uncovered a highly sophisticated spearphishing campaign targeting humanitarian organizations and Ukrainian government agencies. The attackers employed weaponized PDF attachments […]
WhatsApp Zero-Click Vulnerability Privately Reported to Meta During Pwn2Own Hacking Contest
At the recent Pwn2Own Ireland 2025 hacking competition, held from October 21 to 23 in Cork, cybersecurity researchers from Team Z3 opted to privately disclose […]
RedTiger: Open-Source Red Teaming Tool Exploited to Target Gamers and Discord Users
RedTiger, an open-source red-teaming tool initially designed for penetration testing, has been co-opted by cybercriminals to extract sensitive information from gamers and Discord users. Launched […]
Unencrypted OAuth Tokens in ChatGPT Atlas Pose Significant Security Risks
OpenAI’s recent release of the ChatGPT Atlas browser has unveiled a critical security vulnerability: the storage of unencrypted OAuth tokens within a SQLite database on […]
MuddyWater’s Advanced Cyber-Espionage Campaign Deploys Phoenix Backdoor v4
The Iranian-linked Advanced Persistent Threat (APT) group known as MuddyWater has recently intensified its cyber-espionage activities, targeting over 100 governmental and international organizations across the […]
SideWinder APT Group Employs ClickOnce Deployment to Distribute StealerBot Malware in South Asia
The SideWinder advanced persistent threat (APT) group has recently adopted a sophisticated attack strategy utilizing Microsoft’s ClickOnce deployment technology to disseminate StealerBot malware. This campaign, […]
New Python-Based Remote Access Trojan Masquerades as Legitimate Minecraft Client
A sophisticated Python-based Remote Access Trojan (RAT) has recently emerged within the gaming community, camouflaging itself as a legitimate Minecraft client to infiltrate unsuspecting users’ […]
Jingle Thief: Cybercriminals Exploit Festive Season to Target Digital Gift Card Systems
As the festive season approaches, a surge in cyberattacks targeting digital gift card systems has been observed. The Jingle Thief campaign, orchestrated by financially motivated […]
Warlock Ransomware Exploits SharePoint ToolShell Zero-Day Vulnerability in Global Attack Wave
In July 2025, the cybersecurity community identified a significant escalation in ransomware attacks when threat actors associated with the Warlock ransomware began exploiting a critical […]