Search results for: “network security”
Showing results matching your search
Refine your search
-
Russia Shutters Poland’s Consulate in Irkutsk in Tit-for-Tat Measure
Russia’s Foreign Ministry has announced the closure of Poland’s consulate in Irkutsk, a tit-for-tat measure responding to Warsaw’s recent decision to shut down one of Russia’s consulates. This leaves both nations with only one diplomatic…
·
·
1–2 minutes -
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
This week’s cybersecurity bulletin highlights the re-emergence of Mirai-based botnets targeting IoT devices, a surge in sophisticated phishing attacks leveraging AI, and efforts by Singapore to curb government impersonation scams. It also covers privacy upgrades…
·
·
2–3 minutes -
ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
The threat actor ToddyCat is using new hacking tools to steal corporate email data, including a custom tool called TCSectorCopy. They aim to obtain OAuth 2.0 authorization tokens from user browsers for accessing corporate mail.…
·
·
2–3 minutes -
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Five new vulnerabilities have been discovered in Fluent Bit, a popular open-source telemetry agent. These flaws could be exploited to compromise and take over cloud infrastructures, raising significant security concerns. Successful exploitation means attackers could…
·
·
2–3 minutes -
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
A new report highlights a concerning trend with China’s DeepSeek-R1 AI model. Research shows it generates code with significant security vulnerabilities when prompted with politically sensitive topics. Cybersecurity firm CrowdStrike found that the likelihood of…
·
·
2–3 minutes -
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning regarding a critical, actively exploited zero-day vulnerability in Oracle Identity Manager (CVE-2025-52054). This flaw, with a CVSS score of 9.8, allows remote…
·
·
2–3 minutes -
Cloudflare Outage Disrupts X, ChatGPT
Cloudflare outage on November 18 disrupted major internet platforms globally. X (formerly Twitter) and ChatGPT were affected. Cloudflare investigated and resolved the widespread issue.
·
·
1–2 minutes -
AI-Based Obfuscated Malware Evades AV Detection
Malicious Android applications use AI-powered obfuscation to bypass antivirus detection. These apps mimic delivery services, steal user data, and employ sophisticated evasion techniques. Security analysts identified advanced obfuscation, making reverse engineering difficult.
·
·
1–2 minutes -
Japan’s Defense Spending Reaches Postwar Record
Japan’s defense spending hit a postwar record of ¥9.9 trillion for 2025. This marks a 60% increase over five years. The rise reflects Japan’s strategic shift toward stronger military capabilities. It addresses regional uncertainties and…
·
·
2–3 minutes -
Kimsuky and Lazarus Join Forces in Coordinated Attacks
North Korean hacking groups Kimsuky and Lazarus combine forces. They exploit zero-day vulnerabilities in coordinated attacks, targeting critical sectors worldwide. This marks a shift in state-sponsored threat operations.
·
·
1–2 minutes








