UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver a known backdoor referred to as BRICKSTORM. The activity, attributed to UNC5221 and closely related, suspected China-nexus threat clusters, is designed to facilitate persistent access […]

Continue Reading

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks. The critical-rated vulnerabilities in question, discovered by Trend Micro, are listed below – CVE-2025-10643 (CVSS score: 9.1) – An authentication bypass vulnerability that exists within […]

Continue Reading

CyberPowerPC India Unveils Experience Zone Focused on Gamers and Content Creators in Hyderabad

CyberPowerPC India opened its first experience zone in Hyderabad, in collaboration with Vishal Peripherals. The centre lets gamers, streamers, and content creators test high-performance PCs for gaming, video editing, and AI tasks. Visitors can try AAA gaming titles, creative software like Adobe and Blender, and attend community events, experiencing firsthand how premi…

Continue Reading

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

Sep 24, 2025Ravie LakshmananMalware / Windows Security Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus. “The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks,” […]

Continue Reading

iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very security policies designed to stop them. Download the complete iframe security guide here. TL;DR: iframe Security Exposed Payment iframes are being actively exploited by attackers […]

Continue Reading

Google Pixel 10 Pro, Pixel 10 Beat Other Flagship Handsets to Top DxOMark Ranking for Smartphone Displays

Google Pixel 10 Pro XL and Pixel 10 have topped DxOMark’s display rankings, outperforming the Samsung Galaxy S25 Ultra, now in third place. DxOMark praised their well-balanced performance across all tests, highlighting standout features such as accurate colour reproduction, high peak brightness, responsive touch, and eye comfort enhancements, putting them ahead of S…

Continue Reading

Amazon Sale 2025: Best Deals on Refrigerators From Samsung, LG, Haier, Whirlpool and Other Brands

Amazon Great Indian Festival Sale 2025 is live, listing great deals various on electronics, like phones, smartwatches, true wireless stereo (TWS), home appliances, washing machines, refrigerators, PCs, smart TVs, PCs, and laptops. The US-based e-commerce giant is also offering additional cashback, exchange bonuses, interest-free EMI options, and credit card discounts,…

Continue Reading

Google Photos Brings Conversational Photo Editing Feature From Pixel 10 to Other Android Phones

Google has announced that it is now bringing a new artificial intelligence (AI)-enabled feature, which was earlier exclusively available with the Google Pixel 10 series in the US. The conversational editing functionality in Google Photos is now being rolled out to all eligible Android smartphones in the US. However, the California-based tech giant did not […]

Continue Reading

Friendship Over With Microsoft? Nvidia’s $100B Deal Reveals 5 Signals into OpenAI’s Future

The announcement of a strategic partnership between OpenAI and Nvidia on Monday quickly sparked discussion across Silicon Valley. The attention wasn’t centred on financial details but on what the collaboration could mean for the future of artificial intelligence (AI). Crucially, it suggests OpenAI is moving towards reducing its dependence on Microsoft. Here are five…

Continue Reading

Moto G96 Review: A Do-It-All Budget Beast

Motorola’s Moto G96 may look and feel familiar, but under the hood there are plenty of meaningful changes. Key among these is the efficient and seemingly capable processor from Qualcomm and the increased battery capacity. Together, these upgrades aim to improve its overall battery life while delivering better performance than its predecessor.

Continue Reading

State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

Sep 24, 2025Ravie LakshmananVulnerability / Email Security Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been exploited by state-sponsored threat actors. The vulnerability, tracked as CVE-2025-59689, carries a CVSS score of 6.1, indicating medium severity. “Libraesva ESG is affected by a command […]

Continue Reading

WhatsApp’s New Message Translations Feature Can Translate Messages in More than 19 Languages

WhatsApp has introduced a new feature called Message Translations. As the name suggests, it aims to facilitate communication between users around the world by translating messages in real time. It supports six languages on Android and more than 19 on iOS. As per WhatsApp, Message Translations feature works in individual chats, group conversations, as well […]

Continue Reading

Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

Sep 23, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic […]

Continue Reading