Posts

Cyberwarfare in the Israel-Iran Conflict: The Battle Behind the Screens

Image
 As the world watches the escalating military conflict between Israel and Iran, another war is unfolding — one without bombs or missiles, but with malware, surveillance, and data destruction. In recent weeks, the digital battlefield has become a critical front in this long-standing rivalry, exposing not only the technical prowess of both nations but also the global implications of modern cyberwarfare. A New Front in an Old Conflict The physical war erupted in mid-June 2025 with Israeli strikes on Iranian military and nuclear sites, followed by Iranian retaliatory missile launches. But even as a fragile ceasefire came into effect on June 26, the cyber dimension of the conflict intensified, revealing a sophisticated, ongoing digital confrontation. Cyberattacks now accompany kinetic strikes, amplifying their impact and extending the battlefield into financial systems, infrastructure, surveillance networks, and even civilian homes. Israel’s Digital Offensive: Precision and Impact Israe...

The illusion of control: Can we ever fully secure autonomous industrial systems?

Image
  In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven decision-making into operational technology (OT) systems has created the impression of tighter control, smarter response times and predictive efficiency. This feeling of having control might actually be a risky illusion. Autonomous systems are now responsible for critical infrastructure: smart grids, manufacturing lines and water treatment facilities, all relying on interconnected sensors and AI for autonomous decision-making. But as the layers of automation deepen, so too does the complexity, making it increasingly difficult to understand or audit decisions made by machines. As more layers of automation are added, the number of interconnected components – think of sensors, AI algorithms, communication network, and control systems- grows exponentially. Each new layer introduces more variables, dependencies and potential points of failure. AI models themselves often operate as “black boxes,” makin...

New Linux Privilege Escalation Vulnerabilities Give Attackers Full Root Control

Image
  Two newly discovered and interconnected Linux vulnerabilities — CVE-2025-6018 and CVE-2025-6019 — enable unprivileged attackers to escalate privileges to root across major Linux distributions. Affecting millions of systems globally, these flaws represent a severe and urgent security threat requiring immediate action.  Overview of the Vulnerability Chain The vulnerability chain, uncovered by the Qualys Threat Research Unit , hinges on two distinct but related flaws that when exploited in sequence, allow full root access: CVE-2025-6018 — A misconfiguration in the Pluggable Authentication Modules (PAM) on SUSE-based systems allows SSH users to be misclassified as local “active” users. CVE-2025-6019 — A flaw in the libblockdev library, accessible via the udisks daemon , grants root privileges to users in an “allow_active” context. Together, they form a dangerous privilege escalation chain, easily exploitable on systems with default configurations.  CVE-202...

The Hidden AI Threat to Your Software Supply Chain

Image
AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned from intriguing gadgets to indispensable sidekicks for modern developers. A   recent survey by Stack Overflow   revealed that over 76% of developers now rely on these assistants, with more than 80% reporting significant productivity improvements by using AI code generators & augmented code editors. These “virtual teammates” simplify complex tasks, streamline development workflows, and significantly accelerate project timelines. But with every innovation comes new risks. AI coding assistants occasionally generate what’s known as “hallucinations”, confident recommendations for software packages that simply don’t exist.   A recent study  by researchers from the University of Texas at San Antonio, the University of Oklahoma, & Virginia Tech found that open-source LLMs generated hallucinated packages at alarmingly high rates — around 21.7% on average — compared...

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

Image
  Cybersecurity researchers are calling attention to a "large-scale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck , which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute JavaScript code. The cybersecurity company has given the technique an alternate name JSFireTruck owing to the profanity involved. "Multiple websites have been identified with injected malicious JavaScript that uses JSFireTruck obfuscation, which is composed primarily of the symbols [, ], +, $, {, and }," security researchers Hardik Shah, Brad Duncan, and Pranay Kumar Chhaparwal said . "The code's obfuscation hides its true purpose, hindering analysis."   Further analysis has determined that the injected code is designed to check the website ref...

Malware Meets PowerShell: How CyberEYE RAT Disarms Windows Defender

Image
  A new and highly sophisticated Remote Access Trojan (RAT), CyberEYE , has surfaced as a growing threat to Windows environments. Written in .NET and built for modular deployment, this malware stands out for its ability to completely disable Windows Defender using a combination of PowerShell scripting and registry manipulations . Command & Control via Telegram CyberEYE’s communication infrastructure is built on Telegram’s Bot API , which allows threat actors to control infected systems without maintaining their own backend infrastructure. This use of a popular, encrypted messaging platform complicates detection and containment efforts. Plug-and-Play Malware for the Masses CyberEYE includes a user-friendly builder interface , allowing even low-skilled attackers to generate custom payloads without writing code. This ease of use, combined with its feature-rich design, is accelerating adoption across cybercriminal communities. It is distributed via multiple channels inclu...

AI Is Starting to Flex Its Network Security Muscles

Image
Rapid advances in   artificial intelligence (AI)   are transforming our tech-enabled lives in countless ways, both seen and unseen. The domain of network security is no exception. Use of AI is on the rise in cyberattacks as malicious actors take advantage of intelligent automation to increase the speed, scale, and sophistication of attacks. Fortunately, the advantages of advanced AI are also available to help network security teams counter the cyberthreats of today — and those that will emerge in the future. The future of network security and AI Three important ways that AI is shaping the future of network security include: Improving security decision-making Making network protection autonomous Helping security teams become more efficient Improving security decision-making With cyberattacks increasing in frequency, scale, and sophistication, AI has an important role to play in helping identify vulnerabilities and optimizing security policies. Currently, threat modeling is a co...