TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism

TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification.   The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state…

Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds

CloudSEK’s STRIKE team has uncovered a sophisticated cryptocurrency theft operation orchestrated by the threat actor “RedLineCyber,” who deliberately impersonates the notorious RedLine Solutions to establish credibility within underground communities. Rather than collecting comprehensive system data, the malware employs a highly…

SolyxImmortal Malware Abuses Discord to Quietly Harvest Sensitive Information

A newly discovered information-stealing malware, SolyxImmortal, has emerged as a persistent surveillance threat targeting Windows users. Distributed through underground Telegram channels, this Python-based implant combines credential theft, document harvesting, keystroke logging, and screen capture capabilities into a continuously running surveillance…

WhisperPair Vulnerability Allows Attackers to Pair Devices Without User Consent

Google’s Fast Pair technology has revolutionised Bluetooth connectivity, enabling seamless one-tap pairing across supported accessories and account synchronisation for millions of users.  However, a critical vulnerability discovered in flagship audio accessories threatens the security of hundreds of millions of devices.  Attribute  Details …

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected origin servers. Security researchers from FearsOff discovered on October 9, 2025, that requests targeting a specific certificate-validation path could completely…

Google Gemini Flaw Allows Access to Private Meeting Details Through Calendar Events

A harmless-looking Google Calendar invite has revealed a new frontier in the exploitation of artificial intelligence (AI).  Security researchers at Miggo discovered a vulnerability in Google Gemini’s integration with Google Calendar that allowed attackers to bypass privacy controls and exfiltrate sensitive…