Risk & Resilience

N8n Webhooks Exploited For Malware Delivery And Phishing Campaigns Since October 2025

Cisco Talos reports threat actors abusing n8n webhooks to deliver malware, run phishing campaigns, and fingerprint devices using trusted cloud infrastructure.

VaporVM Partners With Cybi To Expand AI Driven Cybersecurity Capabilities Across Regions

VaporVM announces a strategic partnership with France based Cybi to deliver AI powered cybersecurity solutions, threat prediction, and compliance support across Middle East and Europe.

Security Researchers Uncover Six Android Malware Families Targeting Financial Apps And Digital Wallets

Cybersecurity experts identify six new Android malware families, including PixRevolution and BeatBanker, designed to steal funds from banking apps and crypto wallets.

LLM Generated Passwords Raise Security Concerns Over Predictability And Weak Entropy

New research reveals that passwords generated by large language models are predictable and weak in entropy, raising serious cybersecurity risks for enterprises and developers.

OpenAI Revokes macOS App Certificate Following Malicious Axios Supply Chain Incident

OpenAI revokes its macOS app signing certificate after a malicious Axios supply chain attack, confirming no user data compromise while outlining security measures and broader ecosystem risks.

Citizen Lab Reveals Global Use Of Webloc Surveillance System By Law Enforcement To Track Millions

A new report by Citizen Lab exposes how law enforcement agencies worldwide utilize the Webloc platform to monitor 500 million devices through harvested advertising data.

Marimo RCE Vulnerability CVE 2026 39987 Exploited Within Hours After Public Disclosure

A critical Marimo RCE flaw CVE-2026-39987 was exploited within hours of disclosure, enabling unauthenticated shell access and rapid credential theft activity.

Smart Slider 3 Pro Update Compromised Through Nextend Servers Delivers Backdoored Version

A compromised Smart Slider 3 Pro update distributed via Nextend servers delivered a backdoored version affecting WordPress and Joomla sites, enabling remote access and persistence.

Adobe Reader Zero Day Exploited Through Malicious PDF Files Since December 2025

A zero day vulnerability in Adobe Reader has been actively exploited via malicious PDF files since December 2025, enabling data theft, payload delivery, and potential remote execution.

GPUBreach Attack Exploits GDDR6 GPU Memory To Achieve Full CPU Privilege Escalation

GPUBreach, a new RowHammer attack targeting GDDR6 GPUs, enables arbitrary GPU memory access and full CPU privilege escalation, posing risks for cloud AI and multi-tenant deployments.

Flowise AI Agent Builder Faces Active CVSS 10.0 Remote Code Execution Exploitation With 12,000 Instances Exposed

Flowise AI platform suffers a critical CVSS 10.0 code injection vulnerability, exposing over 12,000 instances to remote code execution and full system compromise.

China Linked TA416 Targets European Governments Using PlugX And OAuth Phishing Campaigns

China-linked cyber espionage group TA416 targets European and Middle Eastern government entities using PlugX malware, OAuth phishing, and evolving attack chains.

Recent articles

spot_img