• Cyber Bites - 30 January 2026
    Jan 29 2026

    * Nearly 800,000 Telnet Servers Exposed Globally as Critical Authentication Bypass Vulnerability Faces Active Exploitation

    * JavaScript Package Managers Vulnerable to Supply Chain Attacks Despite npm’s Shai-Hulud Security Measures

    * WhatsApp Launches Strict Account Settings to Shield High-Risk Users From Advanced Spyware Attacks

    * Extortion Group WorldLeaks Claims 1.4 Terabyte Data Theft From Nike in Manufacturing-Focused Breach

    * ShinyHunters Targets Approximately 100 Organisations in Okta Single Sign-On Credential Theft Campaign



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    11 Min.
  • Cyber Bites - 23 January 2026
    Jan 23 2026

    Hey Everyone, for today’s Cyber Bites we’ll be covering stories about companies being compromised by their own security training tools, GitLab patching a two-factor authentication bypass, researchers saying that AI-powered browsers might be undoing years of web security progress, Zendesk support systems being turned into spam engines worldwide and a look at the popular passwords still being used in 2025.

    * Fortune 500 Companies Compromised Through Vulnerable Security Testing Applications

    * GitLab Releases Emergency Patches for Two-Factor Authentication Bypass and Denial-of-Service Vulnerabilities

    * AI-Powered Browsers Reverse Decades of Web Security Advances, Researchers Warn

    * Attackers Weaponise Zendesk Support Systems in Massive Global Spam Campaign

    * Predictable Password Patterns Persist as Billions Continue Using Easily Cracked Credentials



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    11 Min.
  • Cyber Bites - 16th January 2026
    Jan 15 2026

    Hey everyone, and welcome back to Cyber Bites! After a short three-week break, we’re kicking off 2026 with a fresh batch of cyber news. I hope you had a good break and your new year’s off to a safe and secure start.

    * FBI Warns of North Korean Hackers Using Malicious QR Codes in Spear-Phishing Attacks

    * WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging

    * Notorious BreachForums Hacking Site Hit by Data Breach, Over 324,000 Accounts Exposed

    * Instagram Denies Data Breach Amid Claims of 17 Million Account Data Leak

    * Thousands of New Zealanders Impacted by Manage My Health Data Breach



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    10 Min.
  • Cyber Bites - 19th December 2025
    Dec 18 2025
    * Notepad++ Releases Security Update to Address Traffic Hijacking Vulnerability* Google Links Additional Chinese Hacking Groups to Widespread Exploitation of Critical React2Shell Vulnerability* Scammers Abuse PayPal Subscriptions to Send Fake Purchase Notification Emails* Massive Chrome Extension Caught Harvesting Millions of Users’ AI Chat Conversations* Google to Discontinue Its Dark Web Report Security Feature in 2026Notepad++ Releases Security Update to Address Traffic Hijacking Vulnerabilityhttps://notepad-plus-plus.org/news/v889-released/The popular text editor Notepad++ has released version 8.8.9 to address a critical security vulnerability affecting its updater, WinGUp. According to security experts, incidents of traffic hijacking have been reported, where the traffic between the updater client and the Notepad++ update infrastructure was being redirected to malicious servers, resulting in the download of compromised executables.The vulnerability was found to be a weakness in the way the updater validates the integrity and authenticity of the downloaded update file. Exploiting this weakness, an attacker could intercept the network traffic and prompt the updater to download and execute an unwanted binary instead of the legitimate Notepad++ update. To mitigate this issue, the new release introduces a security enhancement that verifies the signature and certificate of the downloaded installers during the update process, and aborts the update if the verification fails.The investigation into the exact method of the traffic hijacking is ongoing, and users will be informed once tangible evidence is established. In the meantime, Notepad++ recommends that users who have previously installed the root certificate should remove it, as the binaries, including the installer, are now digitally signed using a legitimate certificate issued by GlobalSign. Google Links Additional Chinese Hacking Groups to Widespread Exploitation of Critical React2Shell Vulnerabilityhttps://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182/Google’s threat intelligence team has identified five more Chinese cyber-espionage groups joining the ongoing attacks exploiting the critical “React2Shell” remote code execution vulnerability, tracked as CVE-2025-55182. This flaw, which affects the React open-source JavaScript library, allows unauthenticated attackers to execute arbitrary code on React and Next.js applications with a single HTTP request.The list of state-linked threat actors now includes UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595, which have been deploying a variety of malware such as the MINOCAT tunneling software, the SNOWLIGHT downloader, the COMPOOD backdoor, and an updated version of the HISONIC backdoor. According to Google, the vulnerability has a significant number of exposed systems due to the widespread use of React Server Components in popular frameworks like Next.js.In addition to the Chinese hacking groups, Google’s researchers have also observed Iranian threat actors and financially motivated attackers targeting the React2Shell vulnerability, with some deploying XMRig cryptocurrency mining software on unpatched systems. Internet watchdog groups have tracked over 116,000 vulnerable IP addresses, primarily located in the United States, highlighting the widespread impact of this critical flaw. Scammers Abuse PayPal Subscriptions to Send Fake Purchase Notification Emailshttps://www.bleepingcomputer.com/news/security/beware-paypal-subscriptions-abused-to-send-fake-purchase-emails/Cybersecurity researchers have uncovered a new email scam that abuses PayPal’s “Subscriptions” billing feature to send legitimate-looking PayPal emails containing fake purchase notifications. The emails, which appear to come from the legitimate service[at]paypal.com address, state that the recipient’s “automatic payment is no longer active” and include a customer service URL field that has been modified to display a message about a large, expensive purchase.The goal of these scam emails is to trick recipients into believing their account has been used to make an expensive purchase, such as a Sony device, MacBook, or iPhone, and prompt them to call a provided phone number to “cancel or dispute the payment.” This tactic is commonly used to convince victims to engage in bank fraud or install malware on their computers.Investigations have revealed that the scammers are able to send these emails directly from PayPal’s servers by exploiting the company’s Subscriptions feature. When a merchant pauses a subscriber’s subscription, PayPal automatically sends a notification email to the subscriber, which the scammers are then modifying to include the fake purchase information. PayPal has stated that they are actively working to mitigate this method and urge customers to be vigilant and contact their customer support directly if they suspect they have been targeted by this ...
    Mehr anzeigen Weniger anzeigen
    11 Min.
  • Cyber Bites - 12th December 2025
    Dec 11 2025

    * Widespread Exploitation of React2Shell Flaw Compromises Dozens of Organisations

    * Gartner Recommends Ban on AI-Powered Browser Extensions Amid Growing Security Risks

    * Cybercriminals Pivot to Points, Taxes, and Fake Retailers in Surge of SMS Phishing Scams

    * Cybercriminals Exploit Google Ads and AI Platforms to Spread macOS Infostealer Malware

    * Thousands of Exposed Secrets on Docker Hub Put Organisations at Serious Risk



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    9 Min.
  • Cyber Bites - 5th December 2025
    Dec 4 2025

    * Fake Calendly Invites Hijack Ad Manager Accounts by Spoofing Top Brands

    * Widespread Npm Malware Attack Exposes Thousands of Developer Secrets

    * WA Man Responsible for In-Flight “Evil Twin” WiFi Attacks Sentenced to 7 Years in Prison

    * Thousands of Developer Secrets Exposed in Public GitLab Repositories

    * ASX Outage Caused by Security Software Upgrade, Raising Concerns Over Technological Resilience



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    8 Min.
  • Cyber Bites - 28th November 2025
    Nov 27 2025

    * Singapore Orders Apple, Google to Prevent Government Spoofing on Messaging Platforms

    * Massive Cyberattack Targets Real Estate Loan Vendor, Exposing Customer Data of Major Banks

    * Beware of Android TV Streaming Boxes Linked to Cybercrime Activities

    * The Rise of Agentic Bots and the Need for Robust Bot Management

    * FBI Warns of Soaring Account Takeover Fraud Ahead of Holiday Shopping Season



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    10 Min.
  • Cyber Bites - 21st November 2025
    Nov 20 2025

    * WhatsApp Vulnerability Exposes User Phone Numbers, Enabling Large-Scale Enumeration Attacks

    * Critical Vulnerability Discovered in W3 Total Cache WordPress Plugin Enabling PHP Command Injection

    * Azure Experiences Largest-Ever DDoS Attack, Highlighting Ongoing Threat to Cloud Infrastructure

    * Optus Fined $826,000 for Vulnerability That Enabled Scammers to Steal Phone Numbers and Access Bank Accounts

    * Malicious NPM Packages Leverage Adspect Redirects to Evade Security and Lure Victims to Cryptocurrency Scams



    This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
    Mehr anzeigen Weniger anzeigen
    10 Min.