Cybersecurity

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant 

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant 

Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free.
“Because the ransomware is now considered dead, we released the decryptor for public download,” Gen Digital researcher Ladislav Zezula said.
FunkSec, which emerged towards the end of 2024, has claimed 172 victims, according to data from

Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits 

Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits 

Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices.
“The flaws, affecting the device’s ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device,”

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools 

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools 

Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities.
The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access to

Product Walkthrough: A Look Inside Pillar’s AI Security Platform 

Product Walkthrough: A Look Inside Pillar’s AI Security Platform 

In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges.
Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new ways of detecting AI threats, beginning

Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome 

Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome 

Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month.
The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser’s ANGLE and GPU components that could result in a sandbox escape via

Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero 

Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero 

Google has announced that it’s making a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks.
DBSC, first introduced as a prototype in April 2024, is designed to bind authentication sessions to a device so as to prevent threat actors from using stolen cookies to sign-in to victims’ accounts and gain

Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware 

Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware 

Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack targeting a U.S.-based chemicals company in April 2025.
“Over the course of three days, a threat actor gained access to the customer’s network, attempted to download several suspicious files and communicated with malicious infrastructure linked to Auto-Color

Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure 

Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure 

Google Cloud’s Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of the lull to shore up their defenses.
“Since the recent arrests tied to the alleged Scattered Spider (UNC3944) members in the U.K., Mandiant Consulting hasn’t observed any new intrusions directly

Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 

Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 

Cybersecurity researchers have disclosed a now-patched critical security flaw in a popular vibe coding platform called Base44 that could allow unauthorized access to private applications built by its users.
“The vulnerability we discovered was remarkably simple to exploit — by providing only a non-secret app_id value to undocumented registration and email verification endpoints, an attacker

PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain 

PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain 

The maintainers of the Python Package Index (PyPI) repository have issued a warning about an ongoing phishing attack that’s targeting users in an attempt to redirect them to fake PyPI sites.
The attack involves sending email messages bearing the subject line “[PyPI] Email verification” that are sent from the email address noreply@pypj[.]org (note that the domain is not “pypi[.]org”).
“This is

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X