
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved

Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved

eScan and Morphisec are embroiled in a dispute following an update server incident affecting eScan customers. The contention centers on

Cloudflare patched a vulnerability in its ACME validation mechanism. The issue involved handling requests to the “/.well-known/acme-challenge/” directory, posing security

Google’s Fast Pair protocol is facing scrutiny due to a significant vulnerability that permits unauthorized Bluetooth device hijacking, tracking, and

Researchers spotlight the ‘StackWarp’ attack, a novel methodology targeting AMD processors. This vulnerability enables remote code execution in confidential virtual

A significant flaw in AWS CodeBuild could have exposed the cloud provider’s GitHub repositories to unauthorized access, posing risks to

Drones are now embedded in public safety, energy, and defense operations, making their networks a critical attack surface. This blog

Cybercriminals are exploiting vulnerabilities in proxy servers, seeking unauthorized access to commercial large language models, posing significant cybersecurity concerns.

Totolink range extenders are at risk due to a firmware bug that leads to unauthenticated root-level Telnet service, allowing potential

A critical flaw in TOTOLINK EX200 allows remote attackers full control. Tracked as CVE-2025-65606, the vulnerability presents significant risks for
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.