Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities

Google has released a security update addressing 129 vulnerabilities in Android devices, including an actively exploited zero-day vulnerability, CVE-2026-21385, affecting Qualcomm components.

Microsoft warns of RAT delivered through trojanized gaming utilities

Microsoft has identified a campaign involving trojanized gaming utilities, Xeno.exe and RobloxPlayerBeta.exe, which deploy a Remote Access Trojan (RAT). The RAT connects to a command and control (C2) server at IP address 79.110.49[.]15.

Remcos RAT Expands Real-Time Surveillance Capabilities

The Remcos RAT has evolved with new real-time surveillance capabilities and stronger evasion techniques. Originally a legitimate remote management tool, Remcos has been repurposed as a Remote Access Trojan.

Critical Vulnerability in Welker OdorEyes EcoSystem Pulse Bypass System

A critical vulnerability has been identified in the Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller. This vulnerability, which lacks authentication for a critical function, could lead to over- or under-odorization events.

Critical Vulnerabilities in Jinan USR IOT Technology Limited (PUSR) USR-W610

Multiple critical vulnerabilities have been identified in the Jinan USR IOT Technology Limited (PUSR) USR-W610 device, potentially allowing unauthorized access and denial-of-service attacks.

better-auth Flaw Allows Unauthenticated API Key Creation

A critical vulnerability in the better-auth library allows unauthenticated attackers to create API keys for arbitrary users, posing a significant risk of account takeover and MFA bypass.

Crims hit a $20M jackpot via malware-stuffed ATMs

ATM jackpotting is a significant threat, with over $20 million stolen using malware-assisted techniques. The Ploutus malware exploits the XFS API, allowing attackers to dispense cash without bank authorization.

Known Exploited Vulnerabilities Catalog

The vulnerability in TeamT5 ThreatSonar Anti-Ransomware allows remote attackers with administrator privileges to upload malicious files, potentially leading to arbitrary command execution on the server.

Keenadu the tablet conqueror and the links between major Android botnets

Keenadu is a sophisticated backdoor targeting Android devices by embedding itself into the firmware. It mirrors the behavior of the Triada backdoor, allowing attackers to control devices remotely and exfiltrate data.

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

The SmartLoader campaign involves a sophisticated attack using a trojanized Oura MCP server to deploy the StealC infostealer. Threat actors have invested months in building credibility by creating fake GitHub accounts and repositories.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags