Google releases emergency patch actively exploited Chrome zero-day
Tracked as CVE-2025-13223, the flaw stems from a type-confusion issue within Chrome’s V8 JavaScript engine.
Tracked as CVE-2025-13223, the flaw stems from a type-confusion issue within Chrome’s V8 JavaScript engine.
The threat actor adapts its approach based on the value of the target and operational objectives.
Sanctioned individuals increasingly rely on networks of OTC brokers and high-risk virtual asset service providers to convert fiat into stablecoins.
Exploitation attempts come from a diverse set of attackers, ranging from botnets and coin-miners to custom tooling and bespoke scanners.
The DoJ also announced forfeiture actions connected to more than $15 million in cryptocurrency stolen by North Korea’s Lazarus hackers.
Officers seized nearly 250 physical servers from data centers in The Hague and Zoetermeer.
In brief: Microsoft patches Windows kernel zero-day, hackers exploit vulnerabilities in Cisco and NetScaler products, and more.
The main suspect behind VenomRAT was arrested in Greece.
The campaign employs a phishing kit that customizes the page presented to the site visitor depending on a unique string in the URL path.
Attackers leveraged the Cisco flaw to gain pre-authentication admin access and installed a custom web shell called “IdentityAuditAction,” masquerading as a legitimate ISE component.
Showing elements 281 - 290