Cyber Security News

ChainLeak Vulnerabilities Endangering Cloud Infrastructure
Date

ChainLeak Vulnerabilities Endangering Cloud Infrastructure

In early 2026, security researchers discovered a set of dangerous, wide-reaching vulnerabilities in a widely used open-source AI development framework called Chainlit. These vulnerabilities, collectively dubbed ChainLeak, threatened to expose sensitive data and even allow attackers to breach cloud e

Single Click Copilot Attack Stealing Data
Date

Single Click Copilot Attack Stealing Data

In early January 2026, cybersecurity researchers revealed a serious vulnerability in Microsoft Copilot Personal. This consumer-focused AI assistant is integrated into Windows, the Edge browser, and other applications. The vulnerability, called Reprompt, let attackers bypass built-in safety protectio

Fancy Bear's Use Of Credential Theft
Date

Fancy Bear's Use Of Credential Theft

In 2025, the Russian state-sponsored cyber threat actor commonly known as Fancy Bear resurfaced with a refined credential-stealing campaign that demonstrated how simplicity, when paired with precision, can outperform technical complexity. Security researchers at Recorded Future, tracking the a

Kimwolf's Rapid Rise To Botnet Supremacy
Date

Kimwolf's Rapid Rise To Botnet Supremacy

In late 2025, cybersecurity researchers began sounding alarm bells over a new threat in the cybercrime landscape named the Kimwolf botnet, an Android-based malware network that has swiftly ballooned into one of the largest active botnets observed over the last few months. Often described as an Andr

Trust Wallet Links A Massive $8.5M Theft To Shai-Hulud 2.0
Date

Trust Wallet Links A Massive $8.5M Theft To Shai-Hulud 2.0

In late 2025 and early 2026, Trust Wallet confirmed that its Chrome browser extension played a central role in a devastating series of supply chain attacks. Trust Wallet is one of the world's most widely used noncustodial cryptocurrency wallets. These attacks were tied to Shai-Hulud, a sophisticated

RansomHouse's New Encryption Upgrades Stun
Date

RansomHouse's New Encryption Upgrades Stun

In December 2025, cybersecurity researchers observed a significant increase in the RansomHouse ransomware-as-a-service (RaaS) toolset. This signals a concerning trend in adversary capabilities. RansomHouse operators enhanced their encryption engine with a new variant called "Mario." It replaced an

GhostPairing's Stealthy Abuse Of WhatsApp's Device Linking
Date

GhostPairing's Stealthy Abuse Of WhatsApp's Device Linking

A new account takeover method called GhostPairing is now targeting WhatsApp. This exploitation doesn't use stolen passwords, SIM swapping, or zero-day vulnerabilities; instead, it manipulates WhatsApp's device linking feature through advanced social engineering, covertly granting attackers persisten

React2Shell Creates A Crisis In Modern Web Security
Date

React2Shell Creates A Crisis In Modern Web Security

In early December 2025, the cybersecurity community was rocked by the public disclosure of a critical, easily exploitable vulnerability in React Server Components (RSC). RSC is the backbone of many modern web applications. Assigned CVE-2025-55182, and quickly nicknamed React2Shell, this vulnerabilit