Cybersecurity

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time 

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time 

Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling below 20% for the first time.
“We adopted Rust for its security and are seeing a 1000x reduction in memory safety vulnerability density compared to Android’s C and C++ code. But the biggest surprise was Rust’s impact on

Microsoft Patch Tuesday, November 2025 Edition 

Microsoft Patch Tuesday, November 2025 Edition 

Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day bug that is already being exploited. Microsoft also fixed a glitch that prevented some Windows 10 users from taking advantage of an extra year of security updates, which is nice because the zero-day flaw and other critical weaknesses patched today affect all versions of Windows, including Windows 10.

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet 

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet 

The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution.
The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request to the “/bin/get/Main/

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies 

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies 

The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions.
The five individuals are listed below –

Audricus Phagnasay, 24
Jason Salazar, 30
Alexander Paul Travis, 34
Oleksandr Didenko, 28, and
Erick

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels 

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels 

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads.
“The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure,” NVISO researchers Bart Parys, Stef

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks 

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks 

Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and SGLang.
“These vulnerabilities all traced back to the same root cause: the overlooked unsafe use of ZeroMQ (ZMQ) and Python’s pickle deserialization,”

Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets 

Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets 

The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new espionage-focused campaign.
The activity, detected in early September 2025 and assessed to be ongoing, has been codenamed SpearSpecter by the Israel National Digital Agency (INDA).
“The

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns 

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns 

Key Takeaways:

85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.
1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure.
14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns.
LockBit’s reappearance with

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign 

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign 

State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a “highly sophisticated espionage campaign” in mid-September 2025.
“The attackers used AI’s ‘agentic’ capabilities to an unprecedented degree – using AI not just as an advisor, but to execute the cyber attacks themselves,” the AI upstart

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch 

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch 

Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise a device.
“The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of what appears to be a silently patched vulnerability in Fortinet’s FortiWeb product,” Benjamin Harris,

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X