CVE-2025-61882: Oracle Battles Cl0p’s Data Theft Campaign With Emergency Patch

Oracle has quickly released an emergency security patch after the Cl0p ransomware group reportedly exploited a serious zero-day vulnerability, tracked as CVE-2025-61882. The company confirmed that some customers using Oracle E-Business Suite received extortion emails claiming their data had been stolen through this flaw. The vulnerability affects the Concurrent Processing component of Oracle E-Business Suite … Continued

Russian Hackers Gamaredon and Turla Team Up to Deploy Kazuar Backdoor in Ukraine

Russian hackers Gamaredon and Turla have been caught working together in a cyber campaign against Ukraine. This finding comes from cybersecurity company ESET, which uncovered the link after noticing Gamaredon’s tools being used to deliver Turla’s Kazuar backdoor. The activity was observed between February and June 2025, and researchers believe it shows direct collaboration rather … Continued

Scattered Lapsus$ Hunters Announce End of Hacking Spree, But Experts Remain Skeptical

A surprising announcement has come from the cybercrime world. A group calling itself Scattered Lapsus$ Hunters, along with several other well-known hacker aliases, has declared that they are ending their hacking spree. The group posted messages on Telegram and BreachForums, saying they would “go dark” and stop their offensive operations. In their farewell message, the … Continued

North Korean Hackers Use AI to Forge Military IDs in Attack on South Korea

A North Korean hacking group known as Kimsuky has carried out a new cyberattack against South Korea by using artificial intelligence to generate fake military identification cards. Security researchers discovered that the group used these forged IDs in targeted phishing campaigns aimed at organizations linked to South Korea’s defense sector. Researchers from Genians, a South … Continued

New Phoenix Exploit Shows DDR5 Memory Still Vulnerable to RowHammer

Researchers from ETH Zürich and Google have revealed a new RowHammer attack called Phoenix, which is able to defeat the protections built into DDR5 memory modules. The team demonstrated that Phoenix could reliably trigger bit flips and escalate privileges on real DDR5 hardware, completing one exploit in as little as 109 seconds. This finding proves … Continued

Malicious bundle.js Script Steals Developer Credentials from 40+ npm Packages

A significant security breach has recently affected the npm ecosystem, compromising over 40 packages maintained by various developers. The attack involved the injection of a malicious script named bundle.js into these packages, enabling unauthorized access to sensitive credentials. The compromised packages were updated with a function called NpmModule.updatePackage. This function downloads the package’s tarball, modifies … Continued

How to Choose the Right Application Security Testing Tool for Your Team

In today’s fast-moving software landscape, web apps face ever-more sophisticated attacks. For example, Verizon’s 2024 breach report shows a 180% jump in attacks exploiting application vulnerabilities in 2023. This means choosing the right security testing tool is critical. The right tool helps your team find flaws early, cut false alarms, and fit seamlessly into your … Continued

Top 10 Application Security Solutions for 2025

In an era of rapid DevOps and cloud-native development, protecting code and applications is mission-critical. Leading AppSec vendors now offer broad platforms  covering static/dynamic analysis, open-source scanning, container and mobile security, and even runtime self-protection. These tools integrate into CI/CD pipelines and IDEs, enabling “shift-left” security. Below we highlight ten standout companies (enterprise giants and … Continued

Newsletter line