Researchers Demonstrate Passkey Login Bypass Through WebAuthn Manipulation
Security researchers at SquareX, an enterprise browser security firm, have revealed a method that allows [...]
Aug
KernelSU v0.5.7 Vulnerability Allows Android Apps to Gain Root Privileges
Cybersecurity researchers have uncovered a critical flaw in KernelSU version 0.5.7 that could allow malicious [...]
New Android Malware Wave Targets Banking Customers with NFC Relay, Call Hijacking, and Root Exploits
Cybersecurity researchers have uncovered a new wave of Android malware, dubbed PhantomCard, which exploits near-field [...]
Aug
WhatsApp Introduces New Features for Smarter and More Interactive Group Calls
WhatsApp has rolled out new capabilities aimed at making group calls easier to schedule and [...]
Aug
Hackers Leverage CrossC2 to Bring Cobalt Strike Beacon to Linux and macOS
August 14, 2025 – Japan’s Computer Emergency Response Team Coordination Center (JPCERT/CC) has disclosed a [...]
Aug
Adobe Addresses Over 60 Security Vulnerabilities in August 2025 Patch Updates
August 13, 2025 – Adobe has released its August Patch Tuesday security updates, resolving more [...]
Aug
Deepfake AI Trading Scams Target Investors Worldwide
A recent investigation has uncovered a growing wave of fraudulent “AI-driven” trading platforms leveraging deepfake [...]
Aug
How We Discovered TeaOnHer Leaking Thousands of Users’ IDs in Under 10 Minutes
In a twist of irony, a dating gossip app called TeaOnHer—designed for men to share [...]
Aug
New PS1Bot Malware Campaign Leverages Malvertising for Multi-Stage In-Memory Attacks
A newly uncovered malvertising campaign is delivering a sophisticated, modular malware framework known as PS1Bot, [...]
Aug
Fortinet Issues Critical Warning on FortiSIEM Vulnerability (CVE-2025-25256) Amid Active Exploitation
August 13, 2025 — Fortinet has released a critical security advisory concerning a severe vulnerability [...]
Aug