What's Hot
Author: Zeel_Cyberexpert
Beginner to Professional (Practical & Focused) The biggest problem in cybersecurity learning is not a lack of resources.It is lack of direction. This roadmap is written to help students avoid wasting time, avoid learning unnecessary things, and focus only on what is actually required for real cybersecurity roles. One important truth to understand from the start: You do NOT need to learn everything in cybersecurity. Phase 1: Learn Only the Basics That Matter Time required: 1–2 months At the beginning, many students either rush too fast or go too deep into topics they don’t need. Focus only on: You do…
Security researchers have reported a security risk in Google Vertex AI related to its default configuration. The issue allows users with low or read-level permissions to indirectly obtain high-privilege Service Agent access, which can impact enterprise cloud environments. The findings were disclosed by XM Cyber researchers and later reviewed by Google, which stated that the behavior aligns with the current design model. Researchers, however, demonstrated that this design can lead to real-world privilege escalation scenarios. Overview of the Issue Vertex AI uses Service Agents, which are Google-managed identities attached automatically to AI components for internal operations.These Service Agents are granted…
Cybersecurity researchers have uncovered a coordinated attack involving five malicious Google Chrome extensions that were falsely presented as tools related to enterprise platforms like Workday and NetSuite. These extensions were designed to silently take control of user accounts inside corporate environments. The extensions appeared legitimate on the surface but were actually created to steal active login sessions and block security response actions. Malicious Extensions Identified The following five Chrome extensions were confirmed as part of the same attack campaign: Most of these were published under different developer names, but security researchers confirmed they shared the same internal logic and backend…
A serious security flaw has been discovered in a popular WordPress plugin called Modular DS, and attackers are already abusing it to take control of websites. The vulnerability allows anyone on the internet to gain administrator access to a site without needing a username or password. Because of this, affected websites can be fully hijacked — content can be changed, malicious code can be inserted, users can be redirected to scam pages, and private data can be stolen. The issue exists in all versions of Modular DS up to version 2.5.1 and has been fixed in version 2.5.2. The plugin…
In late 2025, cybersecurity teams in Ukraine uncovered a highly targeted cyber-espionage campaign aimed at personnel connected to the country’s defense sector. The operation relied on a previously unseen malware strain known as PLUGGYAPE and marked a shift in how attackers deliver malicious software — by abusing trusted messaging platforms rather than traditional email. The campaign ran quietly for several weeks before being detected, and it was specifically designed to blend into normal daily communication patterns, making it extremely difficult for victims to identify the attack. How the Attack Worked Instead of using obvious phishing emails, the attackers reached out…
Artificial intelligence is not only being used for innovation — it is also being abused by cybercriminals to steal personal data at scale. In 2026, attackers no longer rely on basic phishing emails or malware alone. Instead, they use AI to automate, personalize, and scale attacks that trick people and systems into handing over sensitive information. This article explains how AI-powered data theft works and what individuals and businesses can do to reduce their risk. How AI Is Used to Steal Personal Data 1. AI-Generated Phishing That Looks Real Modern phishing is no longer poorly written or easy to detect.…
Security researchers have identified a new supply chain attack targeting the n8n workflow automation platform, where attackers uploaded multiple malicious packages to the npm registry disguised as legitimate community nodes. These packages were crafted to resemble official integrations, including connectors for Google Ads and performance monitoring services. Once installed, they presented standard configuration interfaces, encouraging users to authorize external accounts. The provided OAuth credentials were then covertly extracted and transmitted to attacker-controlled infrastructure. One of the malicious packages imitated a Google Ads connector and prompted users to link their advertising account through what appeared to be a genuine authorization form.…
In January 2026, cybersecurity researchers reported that personal data belonging to approximately 17.5 million Instagram users was being circulated and traded on underground cybercrime forums and illicit data marketplaces. The dataset was discovered on invitation-only forums and dark web platforms commonly used by cybercriminal groups to exchange stolen databases, phishing resources, and access credentials. According to researchers monitoring these forums, the dataset was advertised as an “Instagram user records dump” and was being shared either for direct sale, exchanged for other stolen data, or distributed to selected forum members to build reputation within cybercrime communities. The exposed data reportedly includes…
Kali Linux is often described as a “hacking OS,” but that description is incomplete and misleading.In reality, Kali Linux is a professional security testing and learning platform designed for penetration testers, SOC analysts, blue-team engineers, and cybersecurity students. It brings together hundreds of tools that support different parts of the security lifecycle — discovery, analysis, testing, and response. For beginners, this can feel overwhelming. This guide solves that problem by: No myths, no hype — only practical guidance. ⚠️ Ethical Reminder: Always test only systems you own or have explicit permission to test. 1. Nmap — Understanding What Exists on…
A sophisticated cyberattack campaign targeting VMware ESXi environments has been uncovered, in which Chinese-speaking threat actors exploited previously unknown vulnerabilities to escape from virtual machines and gain control of the underlying hypervisor. Cybersecurity researchers at Huntress detected the activity in December 2025 and stopped the intrusion before it could reach its final stage. Analysts believe the operation could have been used to deploy ransomware or maintain long-term access to enterprise infrastructure. The attackers initially gained access by compromising a SonicWall VPN appliance. After establishing a foothold, they deployed a custom exploit toolkit designed specifically to target VMware ESXi systems at…