CrowdCyber.com 3 weeks ago DPRK Actors Deploy VS Code Tunnels for Remote Hacking Dark ReadingDPRK Actors Deploy VS Code Tunnels for Remote HackingA spear-phishing campaign tied to the Democratic People
CrowdCyber.com 3 weeks ago INC ransomware opsec fail allowed data recovery for 12 US orgs BleepingComputerINC ransomware opsec fail allowed data recovery for 12 US orgsAn operational security failure allowed researchers to recover data that the INC ransomware gang stole from a dozen U.S. organizations.
CrowdCyber.com 3 weeks ago 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code Dark Reading'Contagious Interview' Attack Now Delivers Backdoor Via VS CodeOnce trust is granted to the repository
CrowdCyber.com 3 weeks ago Fortinet admins report patched FortiGate firewalls getting hacked BleepingComputerFortinet admins report patched FortiGate firewalls getting hackedFortinet customers are seeing attackers exploiting a patch bypass for a previously fixed critical FortiGate authentication vulnerability (CVE-2025-...
CrowdCyber.com 3 weeks ago Cisco fixes Unified Communications RCE zero day exploited in attacks BleepingComputerCisco fixes Unified Communications RCE zero day exploited in attacksCisco has fixed a critical Unified Communications and Webex Calling remote code execution vulnerability, tracked as CVE-2026-20045, that has been a...
CrowdCyber.com 3 weeks ago CVE-2025-13878: High-Severity BIND Flaw Exposes Servers to Remote Crash Daily CyberSecurityCVE-2025-13878: High-Severity BIND Flaw Exposes Servers to Remote CrashHigh-severity BIND 9 flaw CVE-2025-13878 allows remote server crashes via single packet. Update to v9.18.44 or v9.20.18 immediately to prevent DoS.
CrowdCyber.com 3 weeks ago Chainlit AI framework bugs let hackers breach cloud environments BleepingComputerChainlit AI framework bugs let hackers breach cloud environmentsTwo high-severity vulnerabilities in Chainlit, a popular open-source framework for building conversational AI applications, allow reading any file ...
CrowdCyber.com 3 weeks ago Smishing Alert: Telegram Bots Power New PNB MetLife Phishing Campaign Daily CyberSecuritySmishing Alert: Telegram Bots Power New PNB MetLife Phishing CampaignScammers target PNB MetLife users via mobile phishing. Attackers use Telegram bots to steal data & manipulate clipboards for UPI fraud.
CrowdCyber.com 3 weeks ago Complex VoidLink Linux Malware Created by AI Dark ReadingComplex VoidLink Linux Malware Created by AIResearchers say the advanced framework was built almost entirely by agents, marking a significant evolution in the use of AI to develop original ma...
CrowdCyber.com 3 weeks ago Redis RCE Exposed: Researchers Detail Exploit for “Simple” Stack Overflow in Official Containers Daily CyberSecurityRedis RCE Exposed: Researchers Detail Exploit for "Simple" Stack Overflow in Official ContainersPublic exploit disclosed for Redis CVE-2025-62507. Missing stack canaries in Docker allow unauthenticated RCE. Update to v8.3.2 immediately.
CrowdCyber.com 3 weeks ago 'CrashFix' Scam Crashes Browsers, Delivers Malware Dark Reading'CrashFix' Scam Crashes Browsers, Delivers MalwareThe attack consists of a NexShield malicious browser extension, a social engineering technique to crash the browser, and a Python-based RAT.
CrowdCyber.com 0 months ago GitLab Alert: High-Severity 2FA Bypass & DoS Flaws Patched in Urgent Update Daily CyberSecurityGitLab Alert: High-Severity 2FA Bypass & DoS Flaws Patched in Urgent UpdateGitLab patches high-severity 2FA bypass (CVE-2026-0723) & DoS flaws. Update to 18.8.2, 18.7.2, or 18.6.4 immediately to secure your instance.
CrowdCyber.com 0 months ago PurpleBravo’s Targeting of the IT Software Supply Chain PurpleBravo’s Targeting of the IT Software Supply ChainDiscover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like ...
CrowdCyber.com 0 months ago “Contagious” Code: North Korean Hackers Infiltrate Developer Workflows via Visual Studio Code Daily CyberSecurity"Contagious" Code: North Korean Hackers Infiltrate Developer Workflows via Visual Studio Code"Contagious Interview" evolves: DPRK hackers now abuse VS Code tasks & npm install to breach developer systems. Jamf warns of new infection...
CrowdCyber.com 0 months ago Crypto Foundation Cracked: One-Byte Overflow in GNU libtasn1 (CVE-2025-13151) Daily CyberSecurityCrypto Foundation Cracked: One-Byte Overflow in GNU libtasn1 (CVE-2025-13151)CVE-2025-13151: A one-byte overflow in GNU libtasn1 risks memory corruption during cert parsing. Patch now to secure your cryptographic applications.
CrowdCyber.com 0 months ago Fake extension crashes browsers to trick users into infecting themselves MalwarebytesFake extension crashes browsers to trick users into infecting themselvesA fake ad blocker crashes your browser, then uses ClickFix tricks to make you run the malware yourself.
CrowdCyber.com 0 months ago Hidden in Plain Site: PURELOGS Stealer Hides Malware in Archive.org Images Daily CyberSecurityHidden in Plain Site: PURELOGS Stealer Hides Malware in Archive.org ImagesNew PURELOGS campaign uses Archive.org images to hide malware. For just $150, this MaaS steals crypto & passwords via fileless attacks. Spot the si...
CrowdCyber.com 0 months ago WhisperPair: Critical Fast Pair Flaw Exposes Headphones to Hijacking Daily CyberSecurityWhisperPair: Critical Fast Pair Flaw Exposes Headphones to HijackingWhisperPair flaw (CVE-2025-36911) exposes Google Fast Pair devices to hijacking and tracking. Update your headphone firmware now to block silent at...
CrowdCyber.com 0 months ago VoidLink cloud malware shows clear signs of being AI-generated BleepingComputerVoidLink cloud malware shows clear signs of being AI-generatedThe recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artifici...
CrowdCyber.com 0 months ago Vulnerabilities Threaten to Break Chainlit AI Framework Dark ReadingVulnerabilities Threaten to Break Chainlit AI FrameworkFamiliar bugs in a popular open source framework for AI chatbots could give attackers dangerous powers in the cloud.