Search results for: “network security”
Showing results matching your search
Refine your search
-
AI-Based Obfuscated Malware Evades AV Detection
Malicious Android applications use AI-powered obfuscation to bypass antivirus detection. These apps mimic delivery services, steal user data, and employ sophisticated evasion techniques. Security analysts identified advanced obfuscation, making reverse engineering difficult.
·
·
1–2 minutes -
Japan’s Defense Spending Reaches Postwar Record
Japan’s defense spending hit a postwar record of ¥9.9 trillion for 2025. This marks a 60% increase over five years. The rise reflects Japan’s strategic shift toward stronger military capabilities. It addresses regional uncertainties and…
·
·
2–3 minutes -
Kimsuky and Lazarus Join Forces in Coordinated Attacks
North Korean hacking groups Kimsuky and Lazarus combine forces. They exploit zero-day vulnerabilities in coordinated attacks, targeting critical sectors worldwide. This marks a shift in state-sponsored threat operations.
·
·
1–2 minutes -
ShadowRay 2.0: Ray AI Flaw Exploited for Cryptomining
ShadowRay 2.0 exploits a Ray AI flaw, creating a self-spreading GPU cryptomining botnet. Attackers use unpatched vulnerabilities, GitLab, and GitHub to spread malware and hijack computing power.
·
·
3–4 minutes -
Europe Unprepared for Russian Drone Attacks
Europe is unprepared for Russian drone attacks, despite increasing provocations. Integrating Ukraine’s experience is crucial for defense readiness.
·
·
2–3 minutes -
China Sells $13K Switchblade Drone Clone
A Chinese firm unveils a $13,000 loitering munition, a Switchblade clone, expanding global drone technology accessibility and redefining military strategies.
·
·
2–3 minutes -
CVE-2025-8855: 2FA Bypass in Brokerage Automation
CVE-2025-8855 is a critical 2FA bypass vulnerability in Optimus Software’s Brokerage Automation platform. It combines authorization bypass, weak password recovery, and authentication bypass flaws, leading to high-severity risks and unauthorized access.
·
·
3–4 minutes -
ShadowMQ Flaw Exposes AI Inference Engines to Remote Code Execution
Oligo Security found a recurring ZeroMQ/pickle deserialization flaw affecting multiple AI inference frameworks; several vendors have issued patches.
·
·
2–3 minutes -
Fake AI and WhatsApp apps on third‑party Android stores hide spyware, ad fraud
Appknox warns that fake ChatGPT, DALL·E and WhatsApp apps on third‑party Android stores range from harmless wrappers to spyware that intercepts OTPs.
·
·
1–2 minutes -
North Korea’s ‘Contagious Interview’ Malware Delivery
North Korean threat actors in the “Contagious Interview” campaign are now using JSON storage services to host and deliver malicious payloads, signaling an evolving strategy to evade detection and maintain persistence.
·
·
1–2 minutes





