Luxury Brand Impersonation Wave: 1,330 Domains
Researchers tracked 1,330 suspicious domains impersonating 23 luxury brands ahead of peak shopping. Prepare for activation waves with monitoring, takedowns, and buyer guidance.
Researchers tracked 1,330 suspicious domains impersonating 23 luxury brands ahead of peak shopping. Prepare for activation waves with monitoring, takedowns, and buyer guidance.
Attackers actively exploit a Linux kernel use-after-free. Patch quickly, reduce local attack surface, and verify coverage with high-signal detections and a weekly baseline review.
BADCANDY continues to compromise exposed Cisco IOS XE devices via CVE-2023-20198. Close the web UI exposure, patch now, rotate credentials, and verify eradication.
Game-themed extensions on a popular code editor pretended to add Pokémon or Minecraft flair for “vibe coders.” Instead, they executed malware on install, mined Monero, and attempted persistence. Consequently, teams should validate developer workstations, remove suspicious add-ons, rotate secrets, and harden marketplace policies before the next wave appears.
Attackers exploit CVE-2025-61932 in Lanscope Endpoint Manager clients to run code and move laterally. Patch MR/DA endpoints now and reduce internet exposure.
Aardvark is OpenAI’s GPT-5–powered security agent that reads repositories like a human, validates exploitability in a sandbox, and proposes precise patches. Consequently, teams can cut detection and remediation time without slowing delivery.
Edge’s scareware sensor uses on-device AI and SmartScreen integration to shut down tech support scams fast. It exits full-screen traps, warns users, and gives admins policy control.
Abandoned apps, APIs, and identities keep resurfacing. Hunt them continuously, retire them completely, and verify they stay dead—before attackers exploit them.
Garden, a fast BTC bridge, was drained for roughly $11 million days after AML concerns surfaced about flows tied to prior thefts. Consequently, exchanges, market makers, and bridge integrators should validate exposure, add watchlists for tainted flows, and harden solver, deployer, and validator controls before operations resume.
CISA and NSA published a focused plan to harden Microsoft Exchange. Enforce modern authentication, cut exposure, enable Extended Protection, and lock down TLS to stop real-world attacks.