CyberSecurity Research

Top Zero-Day Vulnerabilities Exploited in the Wild in 2025

The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.…

1 day ago

Lessons Learned From Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware

The JavaScript ecosystem experienced one of its most sophisticated and damaging supply chain attacks in September 2025, when a novel…

3 days ago

ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs

ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its advanced evasion…

6 days ago

What Are The Takeaways From The Scattered LAPSUS $Hunters Statement?

The well-known group of cybercriminals called Scattered Lapsus$ Hunters released a surprising farewell statement on BreachForums. This manifesto, a mix…

1 week ago

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell-Based Malware

The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public's need for free internet access,…

1 week ago

Lessons from Salesforce/Salesloft Drift Data Breaches – Detailed Case Study

The Salesloft Drift data breaches of August 2025 stand as one of the most significant supply chain attacks in SaaS…

1 week ago

How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?

Adversary-in-the-Middle (AiTM) attacks are among the most sophisticated and dangerous phishing techniques in the modern cybersecurity landscape. Unlike traditional phishing…

3 weeks ago

Threat Actors Breach High Value Targets like Google in Salesforce Attacks – What Organizations Need to Know

The escalation of sophisticated cyberattacks targeting Salesforce environments has emerged as one of the most concerning trends in enterprise cybersecurity.…

3 weeks ago

Analysis of Apple’s ImageIO Zero-Day Vulnerability: Attacker Context and Historical iOS Zero-Click Similarities

Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day vulnerability in the ImageIO framework that…

4 weeks ago

Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It

Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However, their cloud-based…

4 weeks ago