Category: Data Breaches

Your blog category

  • WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

    WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

    WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks.
    Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability has been described as a case of out-of-bounds write affecting the iked process that could allow a remote unauthenticated attacker to execute arbitrary code.
    “This vulnerability affects both the

  • Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

    Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

    Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme.
    The Nigeria Police Force National Cybercrime Centre (NPF–NCCC) said investigations conducted in collaboration with

  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

    New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

    Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that implement a Unified Extensible Firmware Interface (UEFI) and input–output memory management unit (IOMMU).
    UEFI and IOMMU are designed to enforce a security

  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

    China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

    A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting governmental entities in Southeast Asia and Japan.
    The end goal of these attacks is cyber espionage, Slovak cybersecurity company ESET said in a report published today. The threat activity cluster has been assessed to be active since at least September 2023.

  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

    HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

    Hewlett Packard Enterprise (HPE) has resolved a maximum-severity security flaw in OneView Software that, if successfully exploited, could result in remote code execution.
    The critical vulnerability, assigned the CVE identifier CVE-2025-37164, carries a CVSS score of 10.0. HPE OneView is an IT infrastructure management software that streamlines IT operations and controls all systems via a

  • ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

    ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

    This week’s ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the next big breach could come from.
    From shifting infrastructures to clever social hooks, the week’s activity shows just how fluid the threat landscape has become.
    Here’s the full rundown of what

  • Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

    Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

    The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics (formerly CJ Korea Express).
    “The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile

  • CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

    CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
    The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), has been described as an “embedded malicious code vulnerability” introduced by means of a supply chain compromise

  • Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

    Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

    Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 in attacks targeting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.
    The networking equipment major said it became aware of the intrusion campaign on December 10, 2025, and that it

  • SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

    SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

    SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been actively exploited in the wild.
    The vulnerability, tracked as CVE-2025-40602 (CVSS score: 6.6), concerns a case of local privilege escalation that arises as a result of insufficient authorization in the appliance management console (AMC).
    It affects the following