Blog

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch

    Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch

    A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack.
    The vulnerability, tracked as CVE-2025-66516, is rated 10.0 on the CVSS scoring scale, indicating maximum severity.
    “Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an

  • ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

    ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

    Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there’s a lot happening in the cyber world.
    Criminals are getting creative — using smart tricks to steal data, sound real, and hide in plain sight. But they’re not the only ones moving fast. Governments and security teams are fighting back, shutting down fake

  • Gainsight Expands Impacted Customer List Following Salesforce Security Alert

    Gainsight Expands Impacted Customer List Following Salesforce Security Alert

    Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.
    The company said Salesforce initially provided a list of 3 impacted customers and that it has “expanded to a larger list” as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said “we

  • Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets

    Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets

    The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry.
    The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the “setup_bun.js” loader and the main payload “bun_environment.js.” The

  • Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

    Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

    South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment of Qilin ransomware.
    “This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet), leveraging Managed Service Provider (MSP)

  • When Your $2M Security Detection Fails: Can your SOC Save You?

    When Your $2M Security Detection Fails: Can your SOC Save You?

    Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of defense. Yet security leaders struggle to justify dedicating resources further down the alert lifecycle to their superiors.
    As a result, most organizations’ security investments are asymmetrical, robust detection tools paired with an under-resourced SOC,

  • Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

    Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

    Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet.
    The extension, named Crypto Copilot, was first published by a user named “sjclark76” on May 7, 2024. The developer describes the browser add-on as

  • Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

    Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

    If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast, flexible, and easy to work with—making them favorites for IT teams. But there’s a catch…
    The very tools that make your job easier might also be the reason your systems are at risk.
    These tools are run by the community. That means anyone can add or update packages. Some

  • RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

    RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

    The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent.
    “This is the first time that a RomCom payload has been observed being distributed by SocGholish,” Arctic Wolf Labs researcher Jacob Faires said in a Tuesday report.
    The activity has been attributed with medium-to-high

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

    JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

    Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake adult websites to deceive users into running malicious commands under the guise of a “critical” Windows security update.
    “Campaign leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising,” Acronis said in a