Endpoint Security

Android Malware Incident Hugging Face Repository Misuse
Cybersecurity
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Legal Dispute Arises Between eScan and Morphisec Over Update Server Breach
Cybersecurity
Legal Dispute Arises Between eScan and Morphisec Over Update Server Breach
eScan and Morphisec are embroiled in a dispute following an update server incident affecting eScan customers. The contention centers on claims regarding the identification of ...
Cloudflare Addresses ACME Validation Flaw Exposing Origin Servers
Cybersecurity
Cloudflare Addresses ACME Validation Flaw Exposing Origin Servers
Cloudflare patched a vulnerability in its ACME validation mechanism. The issue involved handling requests to the "/.well-known/acme-challenge/" directory, posing security risks.
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
Cybersecurity
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
Google's Fast Pair protocol is facing scrutiny due to a significant vulnerability that permits unauthorized Bluetooth device hijacking, tracking, and eavesdropping.
AMD's ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Endpoint Security
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Researchers spotlight the ‘StackWarp’ attack, a novel methodology targeting AMD processors. This vulnerability enables remote code execution in confidential virtual machines (VMs), challenging security paradigms ...
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
Application Security
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
A significant flaw in AWS CodeBuild could have exposed the cloud provider's GitHub repositories to unauthorized access, posing risks to multiple AWS environments. Addressed by ...
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
Blog
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
Drones are now embedded in public safety, energy, and defense operations, making their networks a critical attack surface. This blog explores how fragile connectivity, legacy ...
Threat Actors Target Vulnerable Proxy Servers in the Hunt for LLM Services
Endpoint Security
Threat Actors Target Vulnerable Proxy Servers in the Hunt for LLM Services
Cybercriminals are exploiting vulnerabilities in proxy servers, seeking unauthorized access to commercial large language models, posing significant cybersecurity concerns.
Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Endpoint Security
Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Totolink range extenders are at risk due to a firmware bug that leads to unauthenticated root-level Telnet service, allowing potential device takeovers. Security researchers encourage ...
Unpatched Vulnerability in TOTOLINK EX200 Puts Devices at Risk
Cybersecurity
Unpatched Vulnerability in TOTOLINK EX200 Puts Devices at Risk
A critical flaw in TOTOLINK EX200 allows remote attackers full control. Tracked as CVE-2025-65606, the vulnerability presents significant risks for users.