Hackers Abuse Google Tasks Notifications in Sophisticated Phishing Attacks

Attackers abused Google Cloud Application Integration to send phishing emails from legitimate Google domains Emails mimicked Google notifications, redirecting victims through trusted services Nearly 3,200 businesses targeted; most victims in U.S. manufacturing, tech, and finance sectors Over 3,000 organizations fell victim to a sophisticated phishing campaign in December 2025 that weaponized Google’s legitimate application infrastructure…

Read More

React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability

The cybersecurity industry is on high alert following the disclosure of a critical React vulnerability that can be exploited by a remote, unauthenticated attacker for remote code execution.  React (React.js) is an open source JavaScript library designed for creating application user interfaces. Maintained by Meta and a large community of companies and individual developers from…

Read More

F5 introduces post-quantum cryptography tools for application security

Application security firm F5 Inc. today announced a series of new post-quantum cryptography readiness solutions as part of its Application Delivery and Security Platform to help organizations prepare for the cybersecurity threats posed by quantum computing. F5’s new PQC solutions are designed to safeguard sensitive data and maintain performance across hybrid, multicloud and legacy environments at a…

Read More

Lazarus Group targets South Korean supply chains via software flaws

Kaspersky’s Global Research and Analysis Team (GReAT) has identified a new cyber campaign led by the Lazarus Group targeting supply chains in South Korea through combined watering hole attacks and exploitation of vulnerabilities in third-party software. The campaign, dubbed “Operation SyncHole,” was observed targeting at least six organisations across the software, IT, financial, semiconductor, and…

Read More

Palo Alto Networks Expedition Tool Vulnerability Exposes Cleartext Firewall Passwords

Palo Alto Networks has disclosed multiple critical security vulnerabilities in its Expedition migration tool, including a concerning OS command injection flaw that enables attackers to execute arbitrary commands and access sensitive firewall credentials. The command injection vulnerability (CVE-2025-0107) allows authenticated attackers to run arbitrary OS commands as the www-data user, potentially exposing usernames, cleartext passwords, device…

Read More

Zoom Critical Vulnerabilities Let Attackers Escalate Privileges

  The vulnerabilities highlight significant risks for users across various platforms, including Windows, macOS, Linux, iOS, and Android. Zoom Video Communications has disclosed several critical vulnerabilities affecting its Workplace Apps, SDKs, and Rooms Clients. These vulnerabilities, identified in multiple security bulletins, potentially allow attackers to escalate privileges on affected systems. The vulnerabilities highlight significant risks…

Read More

Current Scenario of Mobile Security Challenges & its Future Direction

Each smart phone is always connected to the internet and applications are downloaded from different sources. Hence securing all these applications is a monumental task as each application has its own security vulnerabilities. In an interview with securitydive.in, Clement SAAD, CEO, Pradeo, uncovered some of the startling revelations and explained how serious challenge it is…

Read More