Fake npm utilities remotely delete entire app directoriesLaura FrenchJune 6, 2025The malicious packages create backdoor endpoints and act as wipers when activated.
Application securityChrome extensions transmit sensitive data over HTTP, leak API keysSecurity pros warn that the leaked data could be used to launch profiling, phishing, or other targeted attacks.
Threat Intelligence0-click exploitation of iMessage nickname feature revealedThe now-resolved issue was potentially used to target high-profile individuals, researchers say.
IdentityAndroid trojan ‘Crocodilus’ hijacks accessibility settings for controlThe malware has evolved with new features and spread globally in the past three months.
Data SecurityEncryption and decryption: The foundation of data protection Ensuring information remains confidential and secure is a core cybersecurity technique.
Cloud SecurityCISA warns of attacks on Commvault’s Microsoft Azure environmentCISA believes the attacks on Commvault Azure environments may be part of a larger campaign to target SaaS vendors.
Data SecurityServiceaide data breach exposed info of 483K Catholic Health patientsIncident underscores impact of third-party breaches on health organizations, security experts say.
Application securityGoogle Calendar used as middleman for stealthy NPM malwareThe malicious package also uses Unicode steganography to evade detection.
AI/MLAI that empowers: Redefining security operations excellence with AI + human expertiseDownload eSentire's 10 questions to ask vendors about AI when choosing an MDR provider.
Application securityGoogle settles nearly $1.4B Texas case for collecting personal dataSettlement is the largest individual penalty to date against Google in the state of Texas.
RSACRSAC 2025: Top 5 mobile app risks revealed by half a million assessmentsOrganizations can’t assume apps from the Apple and Google Play stores have been tested for security.