cyber

Foxit Releases Security Updates for PDF Editor Cloud XSS Vulnerabilities

Foxit Software has addressed multiple cross-site scripting (XSS) vulnerabilities in Foxit PDF Editor Cloud and Foxit eSign. These vulnerabilities could allow attackers to execute arbitrary JavaScript within a user's browser.

CrossCurve Bridge Hacked for $3M After Smart Contract Validation Vulnerability Exploited

The CrossCurve bridge suffered a cyberattack resulting in a $3 million loss. Attackers exploited a vulnerability in the smart contract infrastructure, specifically a gateway validation bypass within the ReceiverAxelar contract.

Cyble Research Discovers ShadowHS, an In-Memory Linux Framework for Long-Term Access

ShadowHS is an advanced fileless Linux exploitation framework designed for stealthy, in-memory operations. It enables attackers to maintain long-term access to compromised systems without leaving persistent traces.

Security Researcher Finds Exposed Admin Panel for AI Toy

A critical security vulnerability was discovered in the Bondu AI toy, where an exposed admin panel allowed unauthorized access to sensitive data, including children's personal information and conversation transcripts.
January 28, 2026

Cybercriminals and nation-state groups are exploiting a six-month old WinRAR defect

A critical path-traversal vulnerability in WinRAR is being actively exploited by nation-state groups. The vulnerability, disclosed and patched six months ago, continues to be a target for espionage and financially motivated attacks.

LayerX: Malicious ChatGPT Chrome extensions are stealing account credentials

A significant identity-theft campaign is actively targeting Okta Single Sign-On (SSO) accounts across over 100 high-value enterprises. The campaign is orchestrated by the SLSH cybercriminal group.

Manage My Health Data Breach Sparks Warnings Over Impersonation and Phishing Attempts

Manage My Health, a widely used digital health platform in New Zealand, experienced a cyberattack that compromised documents stored in the "My Health Documents" section. The breach exposed sensitive documents including clinical letters.

CISA’s secure-software buying tool had a simple XSS vulnerability of its own

An XSS vulnerability was discovered in CISA's "Software Acquisition Guide: Supplier Response Web Tool." This vulnerability allowed attackers to inject malicious JavaScript into the web page, potentially affecting other users and defacing the website.

Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace

Microsoft, in collaboration with international law enforcement, dismantled the RedVDS cybercrime marketplace. This operation has disrupted a significant source of cybercriminal activity, which facilitated widespread fraud and cyberattacks.

Sources: DHS finalizing replacement for disbanded critical infrastructure security council

The DHS is in the final stages of establishing a new council, the Alliance of National Councils for Homeland Operational Resilience (ANCHOR), to replace the disbanded Critical Infrastructure Partnership Advisory Council (CIPAC).

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags