
Month: August 2025
-
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could…
-
The inside story of the Telemessage saga, and how you can view the data
#### [Security](/security/)**4** The inside story of the Telemessage saga, and how you can view the data=======================================================================**4** It turns out no…
-
60 malicious Ruby gems downloaded 275,000 times steal credentials
Sixty malicious Ruby gems containing credential-stealing code have been downloaded over 275,000 times since March 2023, targeting developer accounts.The malicious…
-
Google confirms data breach exposed potential Google Ads customers’ info
Google has confirmed that a [recently disclosed data breach](https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/) of one of its Salesforce CRM instances involved the information…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-Malware Newsletter[Arctic…
-
BadCam: Linux-based Lenovo webcam bugs enable BadUSB attacks
Lenovo webcam flaws, dubbed BadCam, let attackers turn them into BadUSB devices to inject keystrokes and launch OS-independent attacks.—————————————————————————————————————————————Eclypsium researchers…
-
Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
Tech giant Google has officially acknowledged a significant data breach affecting its corporate Salesforce database, with the company completing email…
-
Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs…
-
Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
Darknet markets, operating beyond the reach of traditional payment processors and legal systems, rely on escrow systems to secure cryptocurrency…
-
The Solidity Language opensource package was used in a $500,000 crypto heist
A malicious extension for the Solidity programming language in the Cursor AI IDE led to a $500,000 cryptocurrency theft. The…

