<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : CyberSecurity News</title>
<link>https://blog.intelligencex.org/rss/category/cyber-attacks-cybersecurity-news</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : CyberSecurity News</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>Critical Node.js Vulnerability Causes Server Crashes via async_hooks (CVE&#45;2025&#45;59466)</title>
<link>https://blog.intelligencex.org/critical-nodejs-async-hooks-dos-vulnerability</link>
<guid>https://blog.intelligencex.org/critical-nodejs-async-hooks-dos-vulnerability</guid>
<description><![CDATA[ A critical Node.js vulnerability (CVE-2025-59466) allows attackers to crash servers via async_hooks stack overflow. Affects Next.js, React Server Components, and major APM tools. Update immediately. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_696896bf1945d.webp" length="54310" type="image/jpeg"/>
<pubDate>Tue, 20 Jan 2026 11:41:26 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice</title>
<link>https://blog.intelligencex.org/black-basta-ransomware-leader-eu-most-wanted-interpol</link>
<guid>https://blog.intelligencex.org/black-basta-ransomware-leader-eu-most-wanted-interpol</guid>
<description><![CDATA[ Black Basta ransomware leader Oleg Nefedov has been added to the EU Most Wanted and INTERPOL Red Notice lists as Ukrainian and German authorities identify key hackers behind global cyberattacks. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_696f594e7281b.webp" length="70342" type="image/jpeg"/>
<pubDate>Mon, 19 Jan 2026 13:25:56 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>SHADOW#REACTOR Malware Delivers Remcos RAT via Multi&#45;Stage Windows Attack</title>
<link>https://blog.intelligencex.org/shadow-reactor-remcos-rat-windows-attack</link>
<guid>https://blog.intelligencex.org/shadow-reactor-remcos-rat-windows-attack</guid>
<description><![CDATA[ Cybersecurity researchers have identified SHADOW#REACTOR, a new and evasive malware campaign using a layered Windows attack chain to distribute Remcos RAT and gain long-term, covert control over compromised systems. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_69674a5a53204.webp" length="42438" type="image/jpeg"/>
<pubDate>Wed, 14 Jan 2026 17:01:58 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Microsoft Replaces Expiring Secure Boot Certificates in Windows 11 Updates</title>
<link>https://blog.intelligencex.org/windows-secure-boot-certificate-expiry-update</link>
<guid>https://blog.intelligencex.org/windows-secure-boot-certificate-expiry-update</guid>
<description><![CDATA[ Microsoft has begun automatically updating expiring Secure Boot certificates on Windows 11 systems. Learn why the update matters, risks of inaction, and what IT admins should do before 2026. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6967701b4c92f.webp" length="41732" type="image/jpeg"/>
<pubDate>Wed, 14 Jan 2026 17:01:55 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>GoBruteforcer Botnet Exploits Weak Credentials to Target Crypto Databases</title>
<link>https://blog.intelligencex.org/gobruteforcer-botnet-crypto-database-attacks</link>
<guid>https://blog.intelligencex.org/gobruteforcer-botnet-crypto-database-attacks</guid>
<description><![CDATA[ GoBruteforcer malware is targeting cryptocurrency and blockchain project databases by abusing weak credentials, exposed FTP services, and legacy XAMPP stacks. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6965ef097cc8a.webp" length="20858" type="image/jpeg"/>
<pubDate>Tue, 13 Jan 2026 12:55:56 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>VMware Security Flaws Actively Exploited: Broadcom Releases Emergency Patches</title>
<link>https://blog.intelligencex.org/vmware-zero-day-flaws-exploited</link>
<guid>https://blog.intelligencex.org/vmware-zero-day-flaws-exploited</guid>
<description><![CDATA[ Three critical VMware zero-day vulnerabilities are being actively exploited. Broadcom has released urgent patches for ESXi, Workstation, and Fusion. Patch now. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6964f14e099ac.webp" length="37850" type="image/jpeg"/>
<pubDate>Tue, 13 Jan 2026 10:33:38 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>China&#45;Linked Hackers Exploit VMware ESXi Zero&#45;Day Vulnerabilities to Escape Virtual Machines</title>
<link>https://blog.intelligencex.org/vmware-esxi-zero-day-vm-escape</link>
<guid>https://blog.intelligencex.org/vmware-esxi-zero-day-vm-escape</guid>
<description><![CDATA[ China-linked threat actors exploited VMware ESXi zero-day vulnerabilities to escape virtual machines and compromise hypervisors, researchers reveal. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6964e7cda8b82.webp" length="11068" type="image/jpeg"/>
<pubDate>Mon, 12 Jan 2026 18:03:43 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>North Korea&#45;Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft</title>
<link>https://blog.intelligencex.org/northkorea-linked-hackers-steal-billions</link>
<guid>https://blog.intelligencex.org/northkorea-linked-hackers-steal-billions</guid>
<description><![CDATA[ North Korea-linked hackers stole $2.02B in crypto in 2025, mostly from the $1.5B Bybit hack, and made up about 76% of all service-level crypto thefts that year. They used spearphishing, fake job offers, and planted IT workers inside crypto firms to gain access, then laundered funds via Chinese-language laundering services, mixers, and cross‑chain bridges in three laundering waves over ~45 days. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69452a7eedc1c.webp" length="43564" type="image/jpeg"/>
<pubDate>Mon, 22 Dec 2025 16:47:55 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Massive Credential&#45;Spraying Campaign Targets Cisco &amp;amp; Palo Alto Networks VPN Gateways</title>
<link>https://blog.intelligencex.org/credential-spraying-campaign-cisco-palo-alto-vpn-gateways-december-2025</link>
<guid>https://blog.intelligencex.org/credential-spraying-campaign-cisco-palo-alto-vpn-gateways-december-2025</guid>
<description><![CDATA[ In mid-December 2025, threat actors launched a coordinated credential-spraying campaign against enterprise VPN infrastructure, targeting Palo Alto Networks GlobalProtect portals with 1.7 million login attempts in 16 hours and pivoting to Cisco SSL VPNs the next day. Originating from 10,000+ IPs hosted by Germany&#039;s 3xK GmbH, the attacks use automated password spraying rather than vulnerability exploitation. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69447fea0025a.webp" length="32026" type="image/jpeg"/>
<pubDate>Fri, 19 Dec 2025 03:58:08 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>credential spraying, Palo Alto GlobalProtect attack, Cisco SSL VPN, password spraying, 3xK GmbH, VPN gateway attacks, automated login attempts, credential stuffing, enterprise VPN security, December 2025 attack</media:keywords>
</item>

<item>
<title>Kimwolf Botnet Infects 1.8 Million Android TVs for Massive DDoS Assaults</title>
<link>https://blog.intelligencex.org/Kimwolf-botnet-hijacks-1.8million-androidTVs</link>
<guid>https://blog.intelligencex.org/Kimwolf-botnet-hijacks-1.8million-androidTVs</guid>
<description><![CDATA[ Kimwolf is a massive new DDoS botnet infecting over 1.8 million Android-based TVs, TV boxes, and tablets worldwide. It’s linked to the AISURU botnet, uses advanced evasion tactics like Ethereum Name Service (ENS) integration, and mainly exploits devices for proxy and DDoS attacks. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_694394765b013.webp" length="42826" type="image/jpeg"/>
<pubDate>Thu, 18 Dec 2025 12:15:05 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Jaguar Land Rover Faced a Major Cyber Attack Claiming Payroll Data Theft</title>
<link>https://blog.intelligencex.org/landrover-faced-cyberattack</link>
<guid>https://blog.intelligencex.org/landrover-faced-cyberattack</guid>
<description><![CDATA[ In August 2025, a massive cyberattack by the &quot;Scattered Lapsus Hunters&quot; compromised the payroll data of thousands of Jaguar Land Rover employees. The breach forced a global production halt, costing the UK economy an estimated ₹20,000 crore and triggering a 0.1% drop in national GDP. JLR is now providing affected staff with two years of free identity monitoring while regulators investigate the security failure. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69425791b6cac.webp" length="23202" type="image/jpeg"/>
<pubDate>Wed, 17 Dec 2025 12:46:39 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Massive Data Breach: Popular Chrome Extension Found Secretly Logging Millions of Users&amp;apos; AI Conversations.</title>
<link>https://blog.intelligencex.org/massive-data-breach</link>
<guid>https://blog.intelligencex.org/massive-data-breach</guid>
<description><![CDATA[ The widely used Urban VPN Proxy browser extension, installed by millions, was caught secretly harvesting all user conversation data from major AI chatbots (like ChatGPT and Gemini). The extension sends users&#039; prompts and responses to remote servers, allegedly to be sold to advertisers, completely contradicting its advertised &quot;AI protection&quot; feature. This covert collection impacts millions of users across multiple related extensions. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6940ec349d10b.webp" length="42052" type="image/jpeg"/>
<pubDate>Tue, 16 Dec 2025 11:02:55 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale</title>
<link>https://blog.intelligencex.org/new-advanced-phishing-kits</link>
<guid>https://blog.intelligencex.org/new-advanced-phishing-kits</guid>
<description><![CDATA[ Four advanced phishing kits (BlackForce, GhostFrame, InboxPrime AI, and Spiderman) have been detected, significantly escalating large-scale credential theft. They feature MFA bypass (BlackForce), stealthy iframe delivery (GhostFrame), AI-powered email automation (InboxPrime AI), and specialized targeting of European banks (Spiderman). This trend marks a serious industrialization of phishing, making attacks highly effective and difficult to trace. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693d145dda066.webp" length="65430" type="image/jpeg"/>
<pubDate>Sat, 13 Dec 2025 12:38:17 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Windows PowerShell now warns when running Invoke WebRequest scripts</title>
<link>https://blog.intelligencex.org/windows-powershell-warns-invoke-webrequest-scripts</link>
<guid>https://blog.intelligencex.org/windows-powershell-warns-invoke-webrequest-scripts</guid>
<description><![CDATA[ Microsoft has added a new security alert in Windows PowerShell that warns users whenever a script uses Invoke-WebRequest. This change helps reduce the risk of silent downloads, malicious payloads, and misuse by threat actors. The warning gives administrators better visibility into network-related script activity and encourages safer execution practices. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693a5db1223c1.webp" length="12840" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 11:30:28 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>PCIe 5.0+ Security Alert: Trio of Encryption Flaws Leads to Data Handling Vulnerabilities.</title>
<link>https://blog.intelligencex.org/PCIe-5.0-security-alert</link>
<guid>https://blog.intelligencex.org/PCIe-5.0-security-alert</guid>
<description><![CDATA[ Three low-severity security flaws (CVE-2025-9612, CVE-2025-9613, CVE-2025-9614) were found in the PCIe Integrity and Data Encryption (IDE) protocol, affecting PCIe 5.0+ and 6.0 systems. The bugs could allow data corruption or privilege escalation if an attacker gains physical or low-level PCIe access. Intel and AMD products are impacted, and users are advised to apply firmware updates following PCI-SIG and CERT/CC guidance. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693a56be1d2a7.webp" length="62198" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 11:21:37 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>New Vishing Attack Exploits Microsoft Teams and QuickAssist to Deploy .NET Malware</title>
<link>https://blog.intelligencex.org/new-vishing-attack</link>
<guid>https://blog.intelligencex.org/new-vishing-attack</guid>
<description><![CDATA[ Attackers use Microsoft Teams Vishing to trick users into granting remote access via Quick Assist. This leads to the download of a trojanized .NET executable which deploys fileless malware into memory using .NET Reflection to evade detection. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69390113ad970.webp" length="31992" type="image/jpeg"/>
<pubDate>Wed, 10 Dec 2025 11:39:11 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Ransomware Payments Pass $4.5 Billion: What FinCEN’s Numbers Really Show</title>
<link>https://blog.intelligencex.org/ransomware-payments-pass-4-5-billion-fincen-analysis</link>
<guid>https://blog.intelligencex.org/ransomware-payments-pass-4-5-billion-fincen-analysis</guid>
<description><![CDATA[ Ransomware payments reported to the U.S. Treasury’s Financial Crimes Enforcement Network (FinCEN) have now exceeded $4.5 billion, with 2023 standing out as the most expensive year on record at $1.1 billion in payouts across more than 1,500 incidents. Between 2022 and 2024 alone, organizations paid over $2.1 billion to ransomware groups, with Akira driving the highest number of reported incidents while ALPHV/BlackCat collected the largest overall haul, approaching $400 million in payments. Financial services, manufacturing, and healthcare remain the hardest-hit sectors, and most individual ransom payments stayed below $250,000, underscoring how a high volume of “mid-sized” attacks can cumulatively create massive systemic financial risk. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69388f5563c3e.webp" length="77046" type="image/jpeg"/>
<pubDate>Wed, 10 Dec 2025 02:37:12 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>ransomware payments, FinCEN ransomware report, $4.5 billion ransomware, Akira ransomware, ALPHV BlackCat ransomware, 2023 ransomware statistics, ransomware in financial services, ransomware in manufacturing, ransomware in healthcare, median ransom amount, Bitcoin ransomware payments</media:keywords>
</item>

<item>
<title>Cal.com Authentication Bypass via Bad TOTP + Password Checks</title>
<link>https://blog.intelligencex.org/2fa-totp-authentication-bypass-vulnerability</link>
<guid>https://blog.intelligencex.org/2fa-totp-authentication-bypass-vulnerability</guid>
<description><![CDATA[ Critical 2FA vulnerability in next-auth allows attackers to bypass password checks using TOTP codes. Learn how flawed authentication logic exposes user accounts and how to fix it. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69368716af48b.webp" length="32412" type="image/jpeg"/>
<pubDate>Tue, 09 Dec 2025 17:35:37 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs</title>
<link>https://blog.intelligencex.org/widespread-attacks-on-palo-alto</link>
<guid>https://blog.intelligencex.org/widespread-attacks-on-palo-alto</guid>
<description><![CDATA[ Hackers are actively targeting Palo Alto Networks’ GlobalProtect VPNs using old flaws and misconfigurations to breach networks. Over 7,000 IPs are involved, prompting urgent patching and MFA warnings from Palo Alto Networks and CISA. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693813441c897.webp" length="64682" type="image/jpeg"/>
<pubDate>Tue, 09 Dec 2025 10:59:33 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>How Google&amp;apos;s Gemini CLI got hacked via Prompt Injections in Github Actions</title>
<link>https://blog.intelligencex.org/google-gemini-cli-prompt-injection-hack</link>
<guid>https://blog.intelligencex.org/google-gemini-cli-prompt-injection-hack</guid>
<description><![CDATA[ Discover how the &quot;PromptPwnd&quot; vulnerability exposed Google’s Gemini CLI to prompt injection attacks via GitHub Actions. Learn how this critical flaw leaks secrets and how to secure your CI/CD pipelines. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693665c5e3498.webp" length="51654" type="image/jpeg"/>
<pubDate>Mon, 08 Dec 2025 11:23:52 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>New Study Exposes 30+ Security Flaws in AI&#45;Powered IDEs Leading to Data Theft and Code Execution Attacks</title>
<link>https://blog.intelligencex.org/30-securityflaws-in-AI</link>
<guid>https://blog.intelligencex.org/30-securityflaws-in-AI</guid>
<description><![CDATA[ Researchers uncovered over 30 vulnerabilities in popular AI-powered IDEs and coding tools that let attackers use prompt injections plus normal IDE features to steal sensitive data or execute arbitrary code, highlighting the need for “Secure for AI” design principles in developer environments. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69365f5ba4a50.webp" length="39570" type="image/jpeg"/>
<pubDate>Mon, 08 Dec 2025 11:05:16 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Barts Health NHS Confirms Data Breach Following Oracle Zero&#45;Day Vulnerability Exploit</title>
<link>https://blog.intelligencex.org/barts-health-nhs-oracle-zero-day-data-breach</link>
<guid>https://blog.intelligencex.org/barts-health-nhs-oracle-zero-day-data-breach</guid>
<description><![CDATA[ Barts Health NHS Trust discloses major data breach after Oracle zero-day vulnerability exploited by Clop ransomware. Learn about the stolen data, affected hospitals, and what patients need to know. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6933ef435db69.webp" length="63774" type="image/jpeg"/>
<pubDate>Sat, 06 Dec 2025 14:30:30 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Triple Threat Alert: 29.7 Tbps DDoS Record, React&amp;apos;s Critical RCE, and RansomHouse&amp;apos;s Global Rampage</title>
<link>https://blog.intelligencex.org/december-2025-cyber-threat-report-ddos-react-ransomhouse</link>
<guid>https://blog.intelligencex.org/december-2025-cyber-threat-report-ddos-react-ransomhouse</guid>
<description><![CDATA[ December 2025 brings unprecedented cyber threats: Cloudflare blocks record-shattering 29.7 Tbps DDoS attack from Aisuru botnet, React Server Components expose millions to CVSS 10.0 RCE vulnerability nicknamed React2Shell, and RansomHouse ransomware group escalates attacks across multiple sectors with data-only extortion tactics. Critical cybersecurity update: 29.7 Tbps DDoS attack sets new record, CVE-2025-55182 React vulnerability threatens 39% of cloud environments with remote code execution, RansomHouse ransomware targets global organizations with pure data extortion. Immediate action required. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6932012166c5f.webp" length="26416" type="image/jpeg"/>
<pubDate>Fri, 05 Dec 2025 03:16:38 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>29.7 Tbps DDoS attack, Aisuru botnet, React CVE-2025-55182, React2Shell vulnerability, Next.js CVE-2025-66478, RansomHouse ransomware, CVSS 10.0, remote code execution, DDoS record 2025, React Server Components</media:keywords>
</item>

<item>
<title>Marquis Software Solutions Data Breach: Over 400,000 Customers Affected Across 74 US Banks and Credit Unions</title>
<link>https://blog.intelligencex.org/marquis-software-solutions-data-breach-bank-list</link>
<guid>https://blog.intelligencex.org/marquis-software-solutions-data-breach-bank-list</guid>
<description><![CDATA[ A major ransomware attack on Marquis Software Solutions has exposed sensitive data for customers at 74 US banks and credit unions. Learn which institutions are affected and what steps are being taken. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6931230109368.webp" length="54548" type="image/jpeg"/>
<pubDate>Thu, 04 Dec 2025 11:48:48 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>ChatGPT Outage December 2025: What Happened When ChatGPT Went Down Worldwide</title>
<link>https://blog.intelligencex.org/chatgpt-outage-december-2025</link>
<guid>https://blog.intelligencex.org/chatgpt-outage-december-2025</guid>
<description><![CDATA[ ChatGPT suffered a global outage early December 2, 2025, due to a routing misconfiguration and Codex task issues, causing login errors, missing chat histories, and disruptions for thousands of users, resolved within hours. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692fda9279ff2.webp" length="58292" type="image/jpeg"/>
<pubDate>Thu, 04 Dec 2025 11:15:54 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Iran&#45;Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks</title>
<link>https://blog.intelligencex.org/iran-linked-hackers-hit-israeli-sectors</link>
<guid>https://blog.intelligencex.org/iran-linked-hackers-hit-israeli-sectors</guid>
<description><![CDATA[ Palo Alto Networks’ Unit 42 and ESET describe MuddyWater, an Iran-linked cyber espionage group, using new tools like the Fooder loader and MuddyViper backdoor in spear‑phishing campaigns against Israeli and regional critical infrastructure and tech firms, focusing on credential theft, remote access, and stealthy persistence across multiple sectors. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692fd7eb1f8bc.webp" length="25686" type="image/jpeg"/>
<pubDate>Wed, 03 Dec 2025 11:56:12 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Akira Ransomware: The Lightning&#45;Fast SonicWall Attack That Encrypts in Under an Hour</title>
<link>https://blog.intelligencex.org/akira-ransomware-sonicwall-vulnerability-cve-2024-40766-campaign</link>
<guid>https://blog.intelligencex.org/akira-ransomware-sonicwall-vulnerability-cve-2024-40766-campaign</guid>
<description><![CDATA[ Akira ransomware exploits year-old SonicWall CVE-2024-40766 vulnerability in aggressive 2025 campaign, deploying ransomware in as little as 55 minutes, bypassing MFA, and targeting 40+ organizations globally with sophisticated multi-vector attacks combining unpatched devices, misconfigurations, and credential abuse. Akira ransomware targets SonicWall SSL VPN devices via CVE-2024-40766 exploitation. Learn about the July 2025 attack surge, 55-minute encryption timeline, MFA bypass techniques, and critical mitigation strategies to protect your organization from this aggressive threat. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692f7094b2d5c.webp" length="28632" type="image/jpeg"/>
<pubDate>Wed, 03 Dec 2025 04:36:06 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>Akira ransomware, SonicWall CVE-2024-40766, SSL VPN attack, ransomware 2025, SonicWall vulnerability, rapid ransomware deployment, MFA bypass, SonicOS security, Akira campaign, firewall exploitation</media:keywords>
</item>

<item>
<title>WhatsApp SIM Card Requirement: India&amp;apos;s New Cybercrime Prevention Policy Explained</title>
<link>https://blog.intelligencex.org/whatsapp-sim-card-india</link>
<guid>https://blog.intelligencex.org/whatsapp-sim-card-india</guid>
<description><![CDATA[ India&#039;s new Telecommunication Cybersecurity Amendment Rules 2025 mandate active SIM cards for WhatsApp. Learn how this cybercrime prevention policy affects you. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692ea26526d88.webp" length="36446" type="image/jpeg"/>
<pubDate>Tue, 02 Dec 2025 14:02:09 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>New Albiriox MaaS Malware Targets 400+ Apps for On&#45;Device Fraud and Screen Control</title>
<link>https://blog.intelligencex.org/albiriox-maas-malware</link>
<guid>https://blog.intelligencex.org/albiriox-maas-malware</guid>
<description><![CDATA[ Newly discovered Android MaaS (Malware-as-a-Service) tools, Albiriox and RadzaRat, are enabling widespread On-Device Fraud (ODF). Both leverage Accessibility Services for remote control, surveillance, and bypassing security. Albiriox targets 400+ financial apps with overlay attacks and VNC control, while RadzaRat focuses on remote file system access and keylogging. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692e767f953ba.webp" length="58784" type="image/jpeg"/>
<pubDate>Tue, 02 Dec 2025 11:03:00 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>CISA Adds Actively Exploited XSS Bug CVE&#45;2021&#45;26829 in OpenPLC ScadaBR to KEV</title>
<link>https://blog.intelligencex.org/cisa-adds-actively-exploited-xss-bug-cve-2021-26829-in-openplc-scadabr-to-kev</link>
<guid>https://blog.intelligencex.org/cisa-adds-actively-exploited-xss-bug-cve-2021-26829-in-openplc-scadabr-to-kev</guid>
<description><![CDATA[ CISA added the OpenPLC ScadaBR XSS bug (CVE-2021-26829) to its KEV catalog due to confirmed exploitation.
The flaw was used by the Russia-aligned group TwoNet to attack an ICS decoy. Separately, a persistent OAST (Out-of-Band Application Security Testing) operation originating from Google Cloud is continuously scanning for this and 200+ other vulnerabilities. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692d32831e381.webp" length="54554" type="image/jpeg"/>
<pubDate>Mon, 01 Dec 2025 12:49:03 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Hackers Allegedly Claim Breach of Mercedes&#45;Benz USA Legal and Customer Data</title>
<link>https://blog.intelligencex.org/mercedes-benz-usa-data-breach-claim</link>
<guid>https://blog.intelligencex.org/mercedes-benz-usa-data-breach-claim</guid>
<description><![CDATA[ Mercedes-Benz USA allegedly breached: 18.3 GB of litigation strategies and customer data leaked. Discover how this &quot;zestix&quot; attack impacts warranty defense and privacy. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_692d32ef5eb86.webp" length="108650" type="image/jpeg"/>
<pubDate>Mon, 01 Dec 2025 12:15:27 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Public GitLab repositories exposed more than 17,000 secrets</title>
<link>https://blog.intelligencex.org/17000-secrets-exposed-in-gitlab-repos</link>
<guid>https://blog.intelligencex.org/17000-secrets-exposed-in-gitlab-repos</guid>
<description><![CDATA[ Public GitLab repos exposed 17,000+ secrets across 2,800 domains, leaking API keys, tokens and credentials, and highlighting critical DevOps security risks. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692aa215e177a.webp" length="30878" type="image/jpeg"/>
<pubDate>Sat, 29 Nov 2025 13:41:03 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials</title>
<link>https://blog.intelligencex.org/hackers-replace-m-with-rn</link>
<guid>https://blog.intelligencex.org/hackers-replace-m-with-rn</guid>
<description><![CDATA[ A phishing attack uses the deceptive domain “rnicrosoft.com” (replacing &#039;m&#039; with &#039;rn&#039;) to visually mimic the Microsoft login page, stealing user credentials via a homograph attack. Users must validate URLs carefully and use Multi-Factor Authentication (MFA) to prevent compromise. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692aa0465168b.webp" length="51914" type="image/jpeg"/>
<pubDate>Sat, 29 Nov 2025 12:58:16 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Legacy Python Bootstrap Scripts Create Domain&#45;Takeover Risk in Multiple PyPI Packages</title>
<link>https://blog.intelligencex.org/legacy-python-bootstrap-domain-takeover-risk</link>
<guid>https://blog.intelligencex.org/legacy-python-bootstrap-domain-takeover-risk</guid>
<description><![CDATA[ Legacy Python bootstrap scripts in PyPI packages like Tornado expose supply chain risks. ReversingLabs reveals domain takeover vulnerability affecting 6+ packages including slapos.core. Learn about the threat and impact. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692a8a8993d26.webp" length="35086" type="image/jpeg"/>
<pubDate>Sat, 29 Nov 2025 11:47:47 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>North Korean Hackers Release 197 npm Packages for the Purpose of Distributing the Latest OtterCookie Malware in a Major Operation</title>
<link>https://blog.intelligencex.org/north-korean-npm-attack-197-packages</link>
<guid>https://blog.intelligencex.org/north-korean-npm-attack-197-packages</guid>
<description><![CDATA[ North Korean threat actors have launched a large-scale supply-chain attack by publishing 197 malicious npm packages designed to deliver the newly updated OtterCookie malware. The campaign targets developers by mimicking legitimate libraries, stealing authentication cookies, and enabling full account takeover. Security researchers warn that the operation is one of the biggest npm-focused attacks of the year, highlighting the growing risk of compromised open-source ecosystems. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692a891f7d4c7.webp" length="93854" type="image/jpeg"/>
<pubDate>Sat, 29 Nov 2025 11:09:51 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Chrome Extension Discovered Secretly Adding Hidden Solana Transfer Fees to Raydium Swaps</title>
<link>https://blog.intelligencex.org/chrome-extension-discovered-secretly-adding-hidden-solana-transfer-fees-to-raydium-swaps</link>
<guid>https://blog.intelligencex.org/chrome-extension-discovered-secretly-adding-hidden-solana-transfer-fees-to-raydium-swaps</guid>
<description><![CDATA[ Chrome extension scam alert: Crypto Copilot steals Solana by injecting hidden fees into Raydium swaps. Find out if you&#039;re affected and how to protect yourself. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692951f29315b.webp" length="70060" type="image/jpeg"/>
<pubDate>Sat, 29 Nov 2025 10:13:51 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Microsoft to Strengthen Entra ID Authentication Security with Advanced Content Security Policy (CSP) Update in 2026</title>
<link>https://blog.intelligencex.org/microsoft-entra-id-csp-security-update-2026</link>
<guid>https://blog.intelligencex.org/microsoft-entra-id-csp-security-update-2026</guid>
<description><![CDATA[ Microsoft is preparing a major update for Entra ID in 2026 that introduces a stronger Content Security Policy to reduce script injection risks, tighten control over authentication flows, and block unauthorized content sources. The upgrade aims to improve identity security for organizations and help them defend against modern browser-based threats. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692950cb7bd37.webp" length="5228" type="image/jpeg"/>
<pubDate>Fri, 28 Nov 2025 13:03:46 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>Microsoft Entra ID, CSP update, authentication security, identity protection, Microsoft 2026 update, Content Security Policy, enterprise security, zero trust, cybersecurity news, cloud identity</media:keywords>
</item>

<item>
<title>3 SOC Challenges You Need to Solve Before 2026</title>
<link>https://blog.intelligencex.org/3-soc-challenges-you-need-to-solve-before-2026</link>
<guid>https://blog.intelligencex.org/3-soc-challenges-you-need-to-solve-before-2026</guid>
<description><![CDATA[ AI-driven cyberattacks will dominate by 2026, overwhelming legacy SOCs with evasive threats and alert fatigue while business leaders demand clear security ROI. ANY.RUN positions its interactive sandbox and threat intelligence feeds as a way to automate malware analysis, cut false positives, accelerate response, and prove measurable business value from cyber defense investments. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692942670654c.webp" length="51346" type="image/jpeg"/>
<pubDate>Fri, 28 Nov 2025 12:04:51 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>FBI Issues Alert on $262 Million Account Takeover Fraud Wave as Experts Warn of AI&#45;Enhanced Phishing and Holiday Shopping Scams</title>
<link>https://blog.intelligencex.org/fbi-issues-alert-on-262-million-account-takeover-fraud-wave-as-experts-warn-of-ai-enhanced-phishing-and-holiday-shopping-scams</link>
<guid>https://blog.intelligencex.org/fbi-issues-alert-on-262-million-account-takeover-fraud-wave-as-experts-warn-of-ai-enhanced-phishing-and-holiday-shopping-scams</guid>
<description><![CDATA[ FBI warns of $262M in account takeover fraud losses. Learn how cybercriminals use AI-powered phishing, holiday scams &amp; fake sites to steal credentials. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_69293f1d42819.webp" length="37434" type="image/jpeg"/>
<pubDate>Fri, 28 Nov 2025 11:53:53 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Cloud tools JSONFormatter and CodeBeautify quietly leaked thousands of passwords and API keys over several years.</title>
<link>https://blog.intelligencex.org/cloud-tools-jsonformatter-and-codebeautify-quietly-leaked-thousands-of-passwords-and-api-keys-over-several-years</link>
<guid>https://blog.intelligencex.org/cloud-tools-jsonformatter-and-codebeautify-quietly-leaked-thousands-of-passwords-and-api-keys-over-several-years</guid>
<description><![CDATA[ Researchers at watchTowr Labs uncovered that online code tools JSONFormatter and CodeBeautify had been leaking over 80,000 saved snippets containing 5GB of sensitive data, including credentials and personal information from critical sectors worldwide. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692937b2703d7.webp" length="57190" type="image/jpeg"/>
<pubDate>Fri, 28 Nov 2025 11:12:56 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Open AI Mixpanel data breach</title>
<link>https://blog.intelligencex.org/open-ai-mixpanel-data-breach</link>
<guid>https://blog.intelligencex.org/open-ai-mixpanel-data-breach</guid>
<description><![CDATA[ OpenAI removed Mixpanel, a third-party analytics provider, after a breach on Mixpanel&#039;s system exposed limited data (name, email, location) of some OpenAI API users.
ChatGPT users and core OpenAI systems were not affected. Passwords and API keys remain safe.
OpenAI is notifying affected users and is implementing Multi-Factor Authentication (MFA) and enhancing vendor security reviews. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6927ec9029429.webp" length="26678" type="image/jpeg"/>
<pubDate>Thu, 27 Nov 2025 11:46:09 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>RondoDox Botnet Exploits Critical XWiki Flaw to Expand DDoS Infrastructure</title>
<link>https://blog.intelligencex.org/rondodox-botnet-exploits-critical-xwiki-flaw-to-expand-ddos-infrastructure</link>
<guid>https://blog.intelligencex.org/rondodox-botnet-exploits-critical-xwiki-flaw-to-expand-ddos-infrastructure</guid>
<description><![CDATA[ A high severity remote code execution vulnerability (CVE-2025-24893) in XWiki Platform with the highest score (9.8) according to CVSS has become the target of the RondoDox botnet as well as other hackers and is being used to break into unpatched servers around the globe. Crypto miners are being installed, reverse shells are being set up, and compromise systems are being added to the botnet that will later be used for DDoS operations by the attackers, who have also seen a significant increase in exploitation attempts in early November even though patches have been available since February 2025. CISA has ordered all federal agencies to have security measures in place by November 20, 2025, as the vulnerability is still one of the most commonly exploited flaws in the security landscape. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_691aadef920a0.webp" length="31944" type="image/jpeg"/>
<pubDate>Mon, 17 Nov 2025 10:57:31 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Lumma Stealer Resurges with Advanced Browser Fingerprinting Tactics for C&amp;amp;C Evasion</title>
<link>https://blog.intelligencex.org/lumma-stealer-resurges-with-advanced-browser-fingerprinting-tactics-for-cc-evasion</link>
<guid>https://blog.intelligencex.org/lumma-stealer-resurges-with-advanced-browser-fingerprinting-tactics-for-cc-evasion</guid>
<description><![CDATA[ The Lumma Stealer malware is back with improved browser fingerprinting which helps it to dodge detection and to steal crypto wallets, passwords, and confidential information from multiple browsers. It is a new and more malicious version of the old threat which is delivered through phishing emails and cracked software, and it comes equipped with all the technology that allows it to detect and avoid security analysis environments while continuing to be unnoticed on the computers of the victims. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926ee6e06cbe.webp" length="41330" type="image/jpeg"/>
<pubDate>Sat, 15 Nov 2025 13:04:00 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Massive Russian&#45;Linked Phishing Campaign Targets Travelers with 4,300 Fake Hotel Booking Sites</title>
<link>https://blog.intelligencex.org/massive-russian-linked-phishing-campaign-targets-travelers-with-4300-fake-hotel-booking-sites</link>
<guid>https://blog.intelligencex.org/massive-russian-linked-phishing-campaign-targets-travelers-with-4300-fake-hotel-booking-sites</guid>
<description><![CDATA[ A cybercriminal operation among the Russian-speaking community has created more than 4,300 fake websites for hotels and travel bookings since February 2025, with the global market for sophisticated phishing scams that appear to be Booking.com, Expedia, Agoda, and Airbnb as its main target. The phishing kit changes the appearance of the pages according to the URL parameters, offers support for 43 languages, and uses fake CAPTCHA and support chat windows to collect credit card and personal data. The whole action indicates the concept of phishing as a service has evolved and thus attackers are able to perform mass credential theft at scale across the hospitality sector. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926ec2fe6aa0.webp" length="29300" type="image/jpeg"/>
<pubDate>Fri, 14 Nov 2025 11:42:21 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>WhatsApp Hijacking Malware Maverick Emerges as Major Threat to Brazilian Financial Sector</title>
<link>https://blog.intelligencex.org/whatsapp-hijacking-malware-maverick-emerges-as-major-threat-to-brazilian-financial-sector</link>
<guid>https://blog.intelligencex.org/whatsapp-hijacking-malware-maverick-emerges-as-major-threat-to-brazilian-financial-sector</guid>
<description><![CDATA[ The Maverick banking malware campaign exploits WhatsApp&#039;s massive Brazilian user base to distribute sophisticated banking trojans targeting 26 major Brazilian financial institutions. This represents a watershed moment in Latin American cybercrime, combining WhatsApp message hijacking, dual-channel command-and-control infrastructure, and AI-assisted code development to achieve unprecedented scale-with over 62,000 blocked infection attempts in October 2025 alone. Security researchers from Trend Micro, Kaspersky, and CyberProof have identified this as an evolution of the earlier Coyote banking trojan, indicating sustained, coordinated criminal operations with institutional capability operating within Brazil&#039;s cybercriminal ecosystem. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926b94866903.webp" length="27364" type="image/jpeg"/>
<pubDate>Wed, 12 Nov 2025 10:37:56 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Cl0p Ransomware Group Exploits Oracle E&#45;Business Suite Zero&#45;Day: Nearly 30 Victims Named in Extortion Campaign</title>
<link>https://blog.intelligencex.org/cl0p-ransomware-group-exploits-oracle-e-business-suite-zero-day-nearly-30-victims-named-in-extortion-campaign</link>
<guid>https://blog.intelligencex.org/cl0p-ransomware-group-exploits-oracle-e-business-suite-zero-day-nearly-30-victims-named-in-extortion-campaign</guid>
<description><![CDATA[  ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926bb4b77a72.webp" length="40840" type="image/jpeg"/>
<pubDate>Tue, 11 Nov 2025 10:57:26 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Cephalus Ransomware Group Targets Organizations Through Unsecured RDP Access</title>
<link>https://blog.intelligencex.org/cephalus-ransomware-group-targets-organizations-through-unsecured-rdp-access</link>
<guid>https://blog.intelligencex.org/cephalus-ransomware-group-targets-organizations-through-unsecured-rdp-access</guid>
<description><![CDATA[ A new ransomware operation known as Cephalus has emerged as a significant cybersecurity threat, targeting organizations across multiple industries by exploiting unsecured Remote Desktop Protocol access. Using sophisticated encryption and aggressive tactics, the group combines technical sophistication with psychological pressure to extract ransom payments from victims. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_690ee304a53e3.webp" length="26408" type="image/jpeg"/>
<pubDate>Sat, 08 Nov 2025 10:44:33 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>#CephalusRansomware  #RDPRansomwareAttack  #Ransomware2025  #RemoteDesktopProtocol  #CyberThreat  #RansomwareGroup  #DataBreach</media:keywords>
</item>

<item>
<title>Nikkei Data Breach in November 2025</title>
<link>https://blog.intelligencex.org/nikkei-data-breach-in-november-2025</link>
<guid>https://blog.intelligencex.org/nikkei-data-breach-in-november-2025</guid>
<description><![CDATA[ Cybersecurity experts have detected seven significant weaknesses in ChatGPT that belong to OpenAI, comprising prompt injection and memory attacks, which may enable cybercriminals to steal user data from chat histories and AI memories without being noticed. These problems affect the GPT-4o and GPT-5 models and although some repairs have been made, the risk still exists and it is possible that millions of users all over the world are vulnerable to unseen attacks through AI. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_690ee23ab0ffe.webp" length="41370" type="image/jpeg"/>
<pubDate>Thu, 06 Nov 2025 13:19:28 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>European Law Enforcement Uncovers €600 Million Cryptocurrency Scam Network in Historical Cybersecurity Operation</title>
<link>https://blog.intelligencex.org/european-law-enforcement-uncovers-600-million-cryptocurrency-scam-network-in-historical-cybersecurity-operation</link>
<guid>https://blog.intelligencex.org/european-law-enforcement-uncovers-600-million-cryptocurrency-scam-network-in-historical-cybersecurity-operation</guid>
<description><![CDATA[ Authorities in Europe have taken down a huge €600 million cryptocurrency fraud network which was allegedly operated by people from Cyprus, Spain, and Germany. The network attracted victims by means of fake investment platforms that promised high returns and employed various methods like social media ads, cold calls, and fake endorsements. Nine persons have been detained, and a large amount of cash, cryptocurrency, and luxury goods have been confiscated, therefore, it is considered a significant success in Europe’s battle against cybercrime. The agencies involved in the operation communicated through Eurojust and Europol which showcases the increasing necessity of international collaboration in the field of cybersecurity law enforcement. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692827713bccc.webp" length="29064" type="image/jpeg"/>
<pubDate>Wed, 05 Nov 2025 11:56:17 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Massive Data Breach Exposes Information Of Montanans</title>
<link>https://blog.intelligencex.org/massive-data-breach-exposes-information-of-montanans</link>
<guid>https://blog.intelligencex.org/massive-data-breach-exposes-information-of-montanans</guid>
<description><![CDATA[ A major data breach involving Blue Cross Blue Shield of Montana exposed sensitive personal and medical data of nearly 462,000 residents. The breach occurred through a third-party vendor and was discovered months after it began, with notifications to victims delayed over a year. Montana authorities are investigating BCBSMT for delayed reporting and security lapses. A class-action lawsuit alleges negligence and demands compensation. The incident highlights risks in healthcare cybersecurity, especially with third-party providers, and urges affected individuals to monitor their accounts and credit closely. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_690ae276f0480.webp" length="68920" type="image/jpeg"/>
<pubDate>Wed, 05 Nov 2025 11:09:30 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Cybersecurity Threat Alert: SleepyDuck Malware &amp;amp; Supply Chain Attack Evolution</title>
<link>https://blog.intelligencex.org/cybersecurity-threat-alert-sleepyduck-malware-supply-chain-attack-evolution</link>
<guid>https://blog.intelligencex.org/cybersecurity-threat-alert-sleepyduck-malware-supply-chain-attack-evolution</guid>
<description><![CDATA[ A sophisticated malware campaign leverages Ethereum blockchain technology to create a resilient command-and-control network targeting developers through the Open VSX extension marketplace, exposing critical vulnerabilities in software supply chain security. The discovery reveals advanced threat actor capabilities including system reconnaissance, cryptomining operations, and coordinated attacks that traditional security measures struggle to combat. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926e3c479f33.webp" length="59672" type="image/jpeg"/>
<pubDate>Tue, 04 Nov 2025 12:01:23 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>#SleepyDuckMalware #VSXExtensionAttack #BlockchainCommandServer #CryptocurrencyThreat #DeveloperSecurity #SupplyChainAttack #EthereumMalware #RemoteAccessTrojan #CybersecurityThreat #OpenVSXRegistry</media:keywords>
</item>

<item>
<title>Serious Security Warning from ASD Outlines the Ongoing Cisco IOS XE BADCANDY Attack.</title>
<link>https://blog.intelligencex.org/serious-security-warning-from-asd</link>
<guid>https://blog.intelligencex.org/serious-security-warning-from-asd</guid>
<description><![CDATA[ The Australian Signals Directorate warns of BADCANDY, a Lua-based web shell targeting unpatched Cisco IOS XE devices, exploiting CVE-2023-20198 and CVE-2023-20273 with over 150 Australian devices still compromised. State-sponsored group Salt Typhoon is suspected behind the attacks, establishing persistent backdoors for espionage. Organizations must urgently patch systems, disable web management services, remove unauthorized accounts, and implement multi-factor authentication to mitigate this critical threat ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926e460b6cc0.webp" length="51852" type="image/jpeg"/>
<pubDate>Mon, 03 Nov 2025 12:08:06 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>#Cybersecurity  #SecurityNews  #MalwareAlert  #DataBreach  #CyberAttack  #NetworkSecurity  #InfoSec  #TechNews</media:keywords>
</item>

<item>
<title>Windows Server Update Service Exploitation Ensnares At Least 50 Victims: Critical Alert for Enterprises</title>
<link>https://blog.intelligencex.org/windows-server-update-service-exploitation</link>
<guid>https://blog.intelligencex.org/windows-server-update-service-exploitation</guid>
<description><![CDATA[ Critical WSUS vulnerability CVE-2025-59287 exploited in 50+ orgs. Learn attack details, impact, and urgent patching steps to protect your network. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_69059e7370a27.webp" length="55998" type="image/jpeg"/>
<pubDate>Sat, 01 Nov 2025 11:30:59 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>180 ransomware attacks plague education sector worldwide in 2025</title>
<link>https://blog.intelligencex.org/180-ransomware-attacks</link>
<guid>https://blog.intelligencex.org/180-ransomware-attacks</guid>
<description><![CDATA[ In 2025, the education sector faced 180 ransomware attacks globally, a 6% rise from 2024. These attacks disrupted schools and universities, targeting outdated systems and exploiting limited cybersecurity resources. Despite high ransom demands, recovery costs have decreased, showing improved resilience. Stronger defenses and awareness remain crucial to protect education from ongoing ransomware threats. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_690452a71f487.webp" length="76016" type="image/jpeg"/>
<pubDate>Fri, 31 Oct 2025 12:20:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do</title>
<link>https://blog.intelligencex.org/a-new-security-layer-for-macos-takes-aim-at-admin-errors-before-hackers-do</link>
<guid>https://blog.intelligencex.org/a-new-security-layer-for-macos-takes-aim-at-admin-errors-before-hackers-do</guid>
<description><![CDATA[ ThreatLocker has presented its Defense Against Configurations (DAC) technology for macOS to provide a solution for substantial security issues that are mainly attributed to improper configuration. This groundbreaking software not only monitors Macs several times a day but also detects and corrects risky settings such as non-encrypted drives, firewalls turned off, and outdated protocol usage, granting companies using Apple gadgets a complete and automated compliance for risk control and monitoring. DAC security posture is improved by transforming configuration management into a preventive, control aligned with standards. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926e760f33aa.webp" length="35586" type="image/jpeg"/>
<pubDate>Fri, 31 Oct 2025 11:29:24 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices</title>
<link>https://blog.intelligencex.org/experts-reports-sharp-increase-in-automated-botnet-attacks-targeting-php-servers-and-iot-devices</link>
<guid>https://blog.intelligencex.org/experts-reports-sharp-increase-in-automated-botnet-attacks-targeting-php-servers-and-iot-devices</guid>
<description><![CDATA[ The automatic botnet attacks are not only becoming larger but also more complex. Their primary targets are PHP servers and IoT devices all over the globe, and they do this by taking advantage of the already existing weaknesses such as CVE-2017-9841 (PHPUnit), CVE-2021-3129 (Laravel), CVE-2022-47945 (ThinkPHP) and also by misconfiguring clouds. The intention of the criminals is to use the robots that perform their duties automatically to quickly and easily find and take over the less protected systems, and in most cases, they are operating through the cloud to avoid detection and at the same time, steal the important credentials. The use of these botnets is not limited to the DDoS attacks but they have also taken on the roles of credential theft, phishing, and even AI-driven web scraping, thus making the risks to companies, smart homes, and cloud infrastructures greater than ever. The experts are calling for rapid patching, correct configuration, and advanced anomaly detection as the main strategies to combat these threats effectively. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926e7b57f3b4.webp" length="54008" type="image/jpeg"/>
<pubDate>Thu, 30 Oct 2025 12:02:41 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>The Psychology of Hacking: Why People Still Fall for Scams</title>
<link>https://blog.intelligencex.org/psychology-of-hacking</link>
<guid>https://blog.intelligencex.org/psychology-of-hacking</guid>
<description><![CDATA[ The psychology of hacking and scams boils down to exploiting human emotions, trust, and cognitive biases. Scammers use urgency, fear, and authority to trick people into quick, irrational decisions. Even smart people fall victim because these tactics manipulate universal mental shortcuts and emotions. Understanding this helps build awareness and better defenses against cyber deception. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_6901e473b12e7.webp" length="30526" type="image/jpeg"/>
<pubDate>Wed, 29 Oct 2025 12:13:58 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Massive 183 Million Credential Leak Exposes Millions of Gmail Accounts in One of the Largest Data Dumps Ever</title>
<link>https://blog.intelligencex.org/183-million-credential-leak</link>
<guid>https://blog.intelligencex.org/183-million-credential-leak</guid>
<description><![CDATA[ A major data breach has exposed over 183 million email and password combinations, including tens of millions linked to Gmail accounts. The 3.5 terabyte dataset, uncovered by security expert Troy Hunt, was composed of stolen credentials gathered from infostealer malware logs and underground hacking forums. While Google confirmed that Gmail itself was not hacked, experts warn users to change their passwords immediately, enable two-factor authentication, and avoid reusing passwords across multiple services. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_69007b8e2bb29.webp" length="17816" type="image/jpeg"/>
<pubDate>Tue, 28 Oct 2025 13:54:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>How Hackers Target Small Businesses — And How to Fight Back</title>
<link>https://blog.intelligencex.org/how-hackers-target-small-businesses-and-how-to-fight-back</link>
<guid>https://blog.intelligencex.org/how-hackers-target-small-businesses-and-how-to-fight-back</guid>
<description><![CDATA[ Small businesses are prime targets for hackers due to weaker security, making them vulnerable to attacks like phishing and ransomware. Strengthening employee awareness, using strong passwords, performing regular backups, and staying updated are key for protection and business survival. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_69004ac8c4d4b.webp" length="67980" type="image/jpeg"/>
<pubDate>Tue, 28 Oct 2025 10:17:26 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>The Cybersecurity Skills That Will Rule 2026</title>
<link>https://blog.intelligencex.org/cybersecurity-skills-that-will-rule-2026</link>
<guid>https://blog.intelligencex.org/cybersecurity-skills-that-will-rule-2026</guid>
<description><![CDATA[ In 2026, cybersecurity will demand more than traditional technical expertise. From AI-driven threat detection to cloud security and ethical hacking, this article explores the top skills every cybersecurity professional must master to stay ahead of evolving digital threats. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68fc7a9895e86.webp" length="15412" type="image/jpeg"/>
<pubDate>Mon, 27 Oct 2025 13:18:07 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>cybersecurity skills 2026, future of cybersecurity, AI security, ethical hacking, cyber defense, cloud security, threat intelligence, cybersecurity jobs, cybersecurity training, cybersecurity trends 2026</media:keywords>
</item>

<item>
<title>How Machine Learning is Turning Cybersecurity Into a Game of Chess</title>
<link>https://blog.intelligencex.org/how-machine-learning-is-turning-cybersecurity-into-a-game-of-chess</link>
<guid>https://blog.intelligencex.org/how-machine-learning-is-turning-cybersecurity-into-a-game-of-chess</guid>
<description><![CDATA[ Learn how machine learning in cybersecurity is reshaping digital protection, predicting attacks, and outsmarting cybercriminals like a chess grandmaster. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_69005d363d3ae.webp" length="27000" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>GitHub Copilot Hit by Critical CamoLeak Vulnerability</title>
<link>https://blog.intelligencex.org/github-copilot-critical-camoleak-vulnerability</link>
<guid>https://blog.intelligencex.org/github-copilot-critical-camoleak-vulnerability</guid>
<description><![CDATA[ Researchers discovered a critical CamoLeak vulnerability in GitHub Copilot Chat, allowing prompt injection attacks to exfiltrate private repository data, including AWS keys, source code, and confidential vulnerabilities. Learn how this AI security flaw works and strategies to protect sensitive information. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e7614e7ca72.webp" length="20538" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>GitHub Copilot, CamoLeak Vulnerability, Critical Prompt Injection, Exposes Private Data</media:keywords>
</item>

<item>
<title>Cyber Attacks Surge in 2024: How Organizations Can Survive the New Digital Onslaught</title>
<link>https://blog.intelligencex.org/cyber-attacks-surge-in-2024-how-organizations-can-survive-the-new-digital-onslaught</link>
<guid>https://blog.intelligencex.org/cyber-attacks-surge-in-2024-how-organizations-can-survive-the-new-digital-onslaught</guid>
<description><![CDATA[ Cyber attacks surged 30% in 2024, targeting industries like healthcare, finance, and infrastructure. AI-enhanced threats and human errors drive risks. Multi-layered defenses and training are crucial for resilience. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e76cd83a171.webp" length="38158" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>5 signs you’ve been hacked–Here’s how to fight back!</title>
<link>https://blog.intelligencex.org/5-signs-youve-been-hacked</link>
<guid>https://blog.intelligencex.org/5-signs-youve-been-hacked</guid>
<description><![CDATA[ Five red flags mean you’ve been hacked: ransomware pop-ups, fake antivirus warnings, mysterious friend requests, password lockouts, and finding strange software on your system. Stay safe by running backups, verifying unexpected messages, enabling multi-factor authentication, cleaning out unknown software, and acting quickly if your accounts are compromised. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e8b05c4fbb4.webp" length="26484" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Inside the Dark Web: Your Ultimate Guide to the Hidden Side</title>
<link>https://blog.intelligencex.org/what-is-the-dark-web</link>
<guid>https://blog.intelligencex.org/what-is-the-dark-web</guid>
<description><![CDATA[ The dark web is the internet’s secret hideout that isn’t visible on regular search engines. It requires special software like the Tor browser to access and keeps users anonymous. While it&#039;s known for illegal activities, it also helps protect privacy and free speech, especially for people in dangerous situations. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e7a62024e2f.webp" length="39864" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords>the dark web, darkweb, how do people get on the dark web, how do people access the dark web, history of dark web, guide to the dark web</media:keywords>
</item>

<item>
<title>1.5 Millions Devices Under Threat: Massive Cyber Attack</title>
<link>https://blog.intelligencex.org/massive-cyber-attack-1-5-billion-devices-threat</link>
<guid>https://blog.intelligencex.org/massive-cyber-attack-1-5-billion-devices-threat</guid>
<description><![CDATA[ A global cyber attack threatens over 1.5 billion devices, exploiting critical security vulnerabilities across major technology systems. Learn how hackers use SMS phishing, fake websites, insider threats, and supply chain attacks to compromise data, and discover strategies organizations are using to defend against this unprecedented cybersecurity crisis. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e8b2c499268.webp" length="61836" type="image/jpeg"/>
<pubDate>Fri, 10 Oct 2025 13:15:13 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords>cyber attack, cybersecurity breach, 1.5 billion devices, data breach, SMS phishing, insider threat, supply chain attack, zero-day exploit, aviation cyber attack, ransomware, global cyber threat, technology vulnerabilities, zero-trust security, AI in cybersecurity</media:keywords>
</item>

<item>
<title>Google Chrome 0&#45;Day Under Active Attack in 2025 – Update Immediately!</title>
<link>https://blog.intelligencex.org/google-chrome-0-day-under-active-attack-in-2025-update-immediately</link>
<guid>https://blog.intelligencex.org/google-chrome-0-day-under-active-attack-in-2025-update-immediately</guid>
<description><![CDATA[ Google Chrome users are facing a critical threat in 2025: an actively exploited zero-day vulnerability (CVE-2025-10585). Cybercriminals are targeting browsers worldwide, and failing to update could expose sensitive data, passwords, and enterprise environments. This blog explains how the vulnerability works, real-world risks, and immediate steps to protect yourself, including updating Chrome, checking versions, and hardening browser security. Stay ahead of attackers and secure your digital life before it’s too late. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e65f2a6a12b.webp" length="20266" type="image/jpeg"/>
<pubDate>Thu, 18 Sep 2025 15:50:49 +0530</pubDate>
<dc:creator>shelby</dc:creator>
<media:keywords>Google Chrome zero-day 2025, Chrome CVE-2025-10585, Chrome security update, browser vulnerability 2025, zero-day exploitation, Chrome patch update, DevSecOps browser security, endpoint protection Chrome, cyber attack 2025, browser hardening best practices</media:keywords>
</item>

<item>
<title>Russian Hackers Target Polish Hospitals and Water Supply in 2025 Cyber Onslaught</title>
<link>https://blog.intelligencex.org/russian-hackers-target-polish-hospitals-and-water-supply-in-2025-cyber-onslaught</link>
<guid>https://blog.intelligencex.org/russian-hackers-target-polish-hospitals-and-water-supply-in-2025-cyber-onslaught</guid>
<description><![CDATA[ Poland is facing a surge of cyberattacks from Russian-backed hackers, with hospitals and even city water supplies becoming prime targets. Authorities report 20–50 attack attempts every day, and while most are stopped, some have already disrupted healthcare services and compromised sensitive medical data. In one alarming case, hackers nearly shut off a major city’s water supply before being intercepted. Poland has now boosted its cybersecurity budget to €1 billion in 2025, dedicating special funds to protect critical infrastructure like water systems. The attacks highlight how fragile essential services are in the age of cyber warfare—and why strong defence strategies are no longer optional. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e655dcb46fb.webp" length="32630" type="image/jpeg"/>
<pubDate>Wed, 17 Sep 2025 11:59:39 +0530</pubDate>
<dc:creator>shelby</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Jaguar Land Rover Shutdown: A Wake&#45;Up Call for Automotive Cybersecurity</title>
<link>https://blog.intelligencex.org/jaguar-land-rover-shutdown-a-wake-up-call-for-automotive-cybersecurity</link>
<guid>https://blog.intelligencex.org/jaguar-land-rover-shutdown-a-wake-up-call-for-automotive-cybersecurity</guid>
<description><![CDATA[ A cyber-attack just pulled the handbrake on Jaguar Land Rover, forcing the automaker to extend its plant shutdown. This isn’t your usual data leak story — it’s a reminder that today’s cyber threats can grind billion-dollar manufacturing lines to a halt. From supply chain chaos to financial losses, the JLR incident highlights why cybersecurity is no longer just an IT issue but a business survival strategy. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e6546b9cd06.webp" length="31460" type="image/jpeg"/>
<pubDate>Wed, 10 Sep 2025 11:44:39 +0530</pubDate>
<dc:creator>shelby</dc:creator>
<media:keywords>Jaguar Land Rover cyber attack 2025, JLR plant shutdown, automotive cybersecurity, manufacturing cyber attack, industrial cybersecurity, supply chain cyber risks, ransomware in automotive industry, cyber threats to manufacturing, cybersecurity lessons 2025, Jaguar Land Rover breach</media:keywords>
</item>

<item>
<title>Plex Breach 2025: Change Your Password Before It’s Too Late</title>
<link>https://blog.intelligencex.org/plex-breach-2025-change-your-password-before-its-too-late</link>
<guid>https://blog.intelligencex.org/plex-breach-2025-change-your-password-before-its-too-late</guid>
<description><![CDATA[ Plex, the popular personal media streaming platform, just disclosed another data breach impacting a “limited subset” of users. While the stolen info included email addresses, usernames, hashed passwords, and unspecified authentication data, Plex insists the passwords were properly hashed—yet still urges everyone to reset passwords, sign out of all devices, and enable two-factor authentication (2FA).
But why such urgency if the passwords are supposedly secure? What hashing method did Plex use? And why has this happened again—apparently mirroring a 2022 breach? In this blog, we break down exactly what happened, why it matters, and most importantly—what you should do right now to keep your Plex account safe. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e653b8f357a.webp" length="30636" type="image/jpeg"/>
<pubDate>Wed, 10 Sep 2025 11:08:08 +0530</pubDate>
<dc:creator>shelby</dc:creator>
<media:keywords>Plex data breach 2025, Plex password reset, Plex hacked 2025, Plex user database breach, Plex account security  Plex authentication data leak, Plex security incident, Plex password hashing, Plex user, credentials exposed, Plex breach explained, Plex cyber attack 2025, Plex 25 million users breach, Plex streaming security risks, data breach lessons, how to secure Plex account</media:keywords>
</item>

<item>
<title>Massive NPM Supply Chain Attack: 2 Billion Weekly Downloads Compromised Through Phishing</title>
<link>https://blog.intelligencex.org/npm-supply-chain-attack-josh-junon-packages-compromised</link>
<guid>https://blog.intelligencex.org/npm-supply-chain-attack-josh-junon-packages-compromised</guid>
<description><![CDATA[ A sophisticated phishing attack compromised Josh Junon&#039;s NPM account, leading to malicious versions of 18 popular packages with over 2 billion combined weekly downloads, targeting crypto wallets and hijacking transactions through obfuscated malware. Breaking: Major NPM supply chain attack compromises popular packages like chalk, debug, and ansi-styles with 2B+ weekly downloads. Crypto wallet targeting malware injected via phishing attack on maintainer Josh Junon&#039;s account. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e6508514ff9.webp" length="24380" type="image/jpeg"/>
<pubDate>Tue, 09 Sep 2025 11:56:41 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>npm supply chain attack, Josh Junon Qix, chalk package compromised, debug package malware, crypto wallet hijacking, npm phishing attack, package-lock.json security, ethereum wallet attack, npm audit, supply chain security</media:keywords>
</item>

</channel>
</rss>