Elles De Yeager
-
Fantasy Hub: New Android RAT Leverages Telegram for MaaS Operations
Security researchers discovered “Fantasy Hub,” a new Android remote access trojan (RAT) operating as a Malware-as-a-Service (MaaS) platform.
·
·
1–2 minutes -
Russian Initial Access Broker Pleads Guilty in US for Yanluowang Ransomware Attacks
A Russian initial access broker (IAB) pleaded guilty in the United States for facilitating at least seven Yanluowang ransomware attacks, demanding $24 million from American organizations. This case highlights the…
·
·
1–2 minutes -
GootLoader Returns with Novel WOFF2 Font Obfuscation and WordPress Exploits
GootLoader returns with novel WOFF2 font obfuscation and WordPress exploits, rapidly compromising networks. The malware uses custom WOFF2 fonts and exploits WordPress comment sections to deliver malicious payloads.
·
·
1–2 minutes -
Russia Claims to Foil Anglo-Ukrainian Fighter Jet Hijack Plot
Russia’s Federal Security Service (FSB) claims to have foiled an Anglo-Ukrainian plot to hijack a Russian MiG-31 fighter jet equipped with Kinzhal hypersonic missiles, highlighting the ongoing intelligence efforts in…
·
·
2–3 minutes -
Critical XSS Flaw Found in GitHub Enterprise Server: Immediate Update Recommended
A critical DOM-based Cross-Site Scripting (XSS) vulnerability, identified as CVE-2025-11892, has been uncovered in GitHub Enterprise Server, posing a significant risk of privilege escalation and unauthorized workflow triggers. Immediate update…
·
·
1–2 minutes -
Critical Flaw in Combodo iTop Exposes Systems to Remote Code Execution
A critical security flaw in Combodo iTop, a widely adopted IT service management platform, could allow attackers to achieve remote code execution (RCE) and gain full control over affected systems.
·
·
1–2 minutes -
Swiss NCSC Warns of iPhone Phishing Scams After Device Loss
The Swiss National Cyber Security Centre (NCSC) has warned iPhone users about a sophisticated phishing campaign that targets owners of lost devices. Scammers send convincing messages to steal Apple ID…
·
·
2–3 minutes -
AI, Quantum, and Data Sovereignty: Reshaping 2026 Cybersecurity Landscape
The year 2026 is poised to redefine enterprise cybersecurity, as experts predict significant shifts driven by the maturation of artificial intelligence, the looming threat of quantum computing, and an increasingly…
·
·
2–3 minutes -
Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot
Russian authorities have detained eight individuals in the republic of Bashkortostan, alleging their involvement in a plot to sabotage telecommunications infrastructure. The detentions signal a heightened focus on internal security…
·
·
1–2 minutes -
Critical Cisco Firewall Flaws Exploited for Denial-of-Service Attacks
Cisco firewalls are facing new denial-of-service attacks exploiting critical vulnerabilities, CVE-2025-20333 and CVE-2025-20362. These flaws in Cisco’s Secure Firewall ASA and FTD software allow attackers to gain control and force…
·
·
1–2 minutes








