Cyber News & Updates
Breaking news, security alerts, and trending stories from across the cybersecurity landscape.
-
China-Linked Hackers Exploit Legacy Flaws and IIS Servers in Global Espionage Surge
Chinese state-linked cyber actors are increasingly leveraging well-known vulnerabilities and exploiting server misconfigurations to establish enduring footholds within critical networks globally, according to recent reports from cybersecurity researchers.
·
·
2–3 minutes -
Bulgaria Seeks State Control Over Key Lukoil Refinery Amid U.S. Sanctions
Bulgaria’s parliament has enacted new legislation to place the nation’s largest oil refinery, Lukoil Neftochim Burgas, under state control, a direct response to recent U.S. sanctions targeting the Russian energy…
·
·
2–3 minutes -
Chinese State-Backed Hackers Weaponize Old Software Flaws for Global Espionage
Chinese state-backed hackers are exploiting old software vulnerabilities like Log4j and Microsoft IIS for global espionage, bypassing advanced defenses. This highlights the critical need for rigorous patch management against seemingly…
·
·
2–3 minutes -
Google’s AI “Big Sleep” Uncovers Five Critical WebKit Vulnerabilities in Apple Software
Google’s advanced artificial intelligence, dubbed “Big Sleep,” has reportedly identified five critical vulnerabilities within Apple’s widely used WebKit rendering engine, raising fresh questions about the evolving role of AI in…
·
·
2–3 minutes -
Samsung Patches High-Severity Flaw Allowing Remote Code Execution on Android Devices
Samsung has patched a high-severity flaw, CVE-2025-21042, in its Android devices, which could allow remote code execution without user interaction. Users are urged to apply the April 2025 Security Maintenance…
·
·
2–3 minutes -
Hidden “Logic Bombs” Found in Popular Software Packages, Threatening Future Industrial Sabotage and Data Corruption
Security researchers have uncovered a new wave of ‘logic bombs’ hidden within commonly used software, designed to disrupt critical industrial systems and corrupt databases, posing significant challenges for detection and…
·
·
2–3 minutes -
SesameOp Backdoor Leverages OpenAI API for Stealthy Command and Control
Microsoft has identified a novel backdoor, dubbed “SesameOp,” that utilizes OpenAI’s Assistants API as a command-and-control (C2) channel. This sophisticated technique allows threat actors to stealthily orchestrate malicious activities within…
·
·
1–2 minutes -
MIT Retracts Controversial AI Ransomware Study Amid Expert Scrutiny
MIT’s Sloan School of Management has retracted a study claiming AI drives 80% of ransomware attacks after cybersecurity experts raised concerns about its methodology and evidence.
·
·
2–3 minutes -
WordPress Sites Targeted by Critical Post SMTP Plugin Vulnerability
A critical vulnerability in the Post SMTP WordPress plugin (CVE-2025-11833) is actively being exploited, risking websites with over 400,000 active installations. Attackers can access email logs to intercept sensitive information,…
·
·
1–2 minutes -
Google’s AI “Big Sleep” Discovers Five Critical WebKit Vulnerabilities in Apple Software
Google’s AI cybersecurity agent “Big Sleep” has discovered five security flaws in Apple’s WebKit, leading to patches in the latest software updates. The vulnerabilities could cause browser crashes or memory…
·
·
1–2 minutes







