News

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

Salesforce Investigates Unauthorized Data Access Linked to Gainsight OAuth Tokens In a recent announcement, Salesforce revealed that some customer data may have been accessed without proper authorization. The incident appears to be linked to OAuth tokens associated with Gainsight, a customer success platform. If you’re a Salesforce user or rely on third-party integrations, here’s what […]

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity Read More »

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

New Cyber Threats You Need to Know: Spyware, Hacked IoT Devices, and Crypto Crimes Cybersecurity buffs and everyday internet users alike have a fresh wave of threats to watch out for. A recent report sheds light on some pretty serious online dangers, stretching from sneaky LinkedIn connections all the way to powerful new malware attacks.

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves Read More »

⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

Cybersecurity Weekly: Fortinet Under Fire, China’s AI Hackers, and a Phishing Empire Crumbles It’s been a big week in the world of cybersecurity, with developers, tech teams, and VPN users all scrambling to make sense of a wave of new threats. If you’ve been using Fortinet products or operating any kind of online business, this

⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More Read More »

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

North Korean Hackers Find a New Trick: Hiding Malware in JSON Web Services Cybersecurity threats are constantly evolving, and just when we think we’ve seen it all, something new pops up. In a surprising twist, experts have discovered that North Korean hackers are now using JSON web services—a common technology used by millions of websites

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels Read More »

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

North Korean Hackers Use JSON Services to Sneak in Malware: What You Should Know In the world of cybercrime, hackers are always looking for new doors to sneak through. This time, North Korean hacking groups have discovered a clever new way to deliver malware without raising too many eyebrows. Instead of using old and obvious

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels Read More »

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

Major AI Vulnerability Found in Microsoft, Nvidia, and Meta Tools AI May Be Smart, But It’s Not Always Safe Artificial intelligence is doing everything from making your voice assistant smarter to helping self-driving cars avoid accidents. But what if the tools powering all these cool innovations had major security holes? That’s exactly what researchers recently

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks Read More »

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

Ransomware Gangs Split Up: What It Means for Cybersecurity in 2025 Ransomware might sound like a far-off tech issue, but in today’s digital world, it’s closer to home than many of us realize. In recent years, ransomware groups have grown more dangerous and more organized. But now, things are starting to shift. The landscape is

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns Read More »

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Chinese Hackers Reportedly Use AI Tool from Anthropic in Major Cyber Espionage Operation The rise of AI and its unexpected role in global hacking campaigns Artificial intelligence has been making headlines for all the right reasons – from streamlining work tasks to helping students learn faster. But what happens when this powerful technology falls into

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign Read More »

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

Serious Security Flaw in Fortinet FortiWeb Was Used in Real Attacks Cybersecurity threats are always lurking around the corner, and sometimes, even major tech companies get caught off guard. Recently, a critical vulnerability was discovered in Fortinet’s FortiWeb product, one that let attackers sneak in, create unauthorized admin accounts, and gain full control over targeted

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Read More »

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch

Fortinet’s FortiWeb Vulnerability Exploited Before Silent Patch Released Imagine waking up to find that your security camera had been off all night without you knowing. That’s the kind of surprise many IT teams experienced recently after a serious flaw was found – and actively exploited – in Fortinet’s FortiWeb web application firewall. Fortinet, a big

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch Read More »