Cybersecurity

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic 

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic 

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network traffic to glean details about model conversation topics despite encryption protections under certain circumstances.
This leakage of data exchanged between humans and streaming-mode language models could pose serious risks to

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp 

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp 

A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade” Android spyware dubbed LANDFALL in targeted attacks in the Middle East.
The activity involved the exploitation of CVE-2025-21042 (CVSS score: 8.8), an out-of-bounds write flaw in the “libimagecodec.quram.so” component that could allow remote attackers to execute arbitrary

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools 

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools 

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues.
The organization, according to a report from Broadcom’s Symantec and Carbon Black teams, is “active in attempting to influence U.S. government

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation 

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation 

A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems.
According to software supply chain security company Socket, the packages were published in 2023 and 2024 by a user named “shanhai666” and are designed to run malicious code after specific trigger dates in August 2027 and

Enterprise Credentials at Risk – Same Old, Same Old? 

Enterprise Credentials at Risk – Same Old, Same Old? 

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she’s just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are laughing all the way to their dark web

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts 

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts 

Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform and demand ransoms to remove the negative comments.
The approach is designed to tackle a common practice called review bombing, where online users intentionally post negative user reviews in an

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities 

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities 

Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, vibe-coded.
Secure Annex researcher John Tuckner, who flagged the extension “susvsex,” said it does not attempt to hide its malicious functionality. The extension was uploaded on

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine 

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine 

A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities.
The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned.
“InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X