Cybersecurity

Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware 

Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware 

The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from Italian information technology and services provider Memento Labs, according to new findings from Kaspersky.
The vulnerability in question is CVE-2025-2783 (CVSS score: 8.3), a case of sandbox escape which the company disclosed in March 2025 as having come under

SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats 

SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats 

A European embassy located in the Indian capital of New Delhi, as well as multiple organizations in Sri Lanka, Pakistan, and Bangladesh, have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder in September 2025.
The activity “reveals a notable evolution in SideWinder’s TTPs, particularly the adoption of a novel PDF and ClickOnce-based infection chain, in

X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts 

X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts 

Social media platform X is urging users who have enrolled for two-factor authentication (2FA) using passkeys and hardware security keys like Yubikeys to re-enroll their key to ensure continued access to the service.
To that end, users are being asked to complete the re-enrollment, either using their existing security key or enrolling a new one, by November 10, 2025.
“After November 10, if you

New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands 

New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands 

Cybersecurity researchers have discovered a new vulnerability in OpenAI’s ChatGPT Atlas web browser that could allow malicious actors to inject nefarious instructions into the artificial intelligence (AI)-powered assistant’s memory and run arbitrary code.
“This exploit can allow attackers to infect systems with malicious code, grant themselves access privileges, or deploy malware,” LayerX

⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens 

⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens 

Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep finding new ways to exploit both system flaws and human behavior.
Each new breach proves a harsh truth: in cybersecurity, feeling safe can be far more dangerous than being alert.
Here’s how that false sense of security

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack 

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack 

The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start of 2025, barring January, with the number of postings on its data leak site touching a high of 100 cases in June.
The development comes as the ransomware-as-a-service (RaaS) operation has emerged as one of the most active ransomware groups, accounting for

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands 

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands 

The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its omnibox can be jailbroken by disguising a malicious prompt as a seemingly harmless URL to visit.
“The omnibox (combined address/search bar) interprets input either as a URL to navigate to, or as a natural-language command to the agent,” NeuralTrust said in a report published Friday

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation 

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation 

The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42.
“Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is

Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability 

Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability 

Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild.
The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign 

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign 

A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT.
The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent Tribe (aka APT36), a state-sponsored hacking group known to be active since at least 2013. It also builds upon a prior

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X