It’s a malware evasion technique called “Shade BIOS” – and it’s going to rock your world.

It’s a malware evasion technique called “Shade BIOS” – and it’s going to rock your world.

At Black Hat USA 2025, Kazuki Matsuo, a security researcher at FFRI Security, is set to introduce the cybersecurity community to a groundbreaking new technique in attack stealth: “Shade BIOS.” This presentation promises to shed light on how the next wave of UEFI (Unified Extensible Firmware Interface) malware can evade even the most robust security mechanisms, setting a new bar in the ongoing arms race between attackers and defenders.
Storm-2603 Exploits SharePoint Flaws to Deliver Dual Ransomware via DNS-Controlled Backdoor

Storm-2603 Exploits SharePoint Flaws to Deliver Dual Ransomware via DNS-Controlled Backdoor

A sophisticated and likely China-based threat actor, tracked as Storm-2603, has emerged at the forefront of recent cyberattacks exploiting critical Microsoft SharePoint Server vulnerabilities. Leveraging flaws identified as CVE-2025-49706 and CVE-2025-49704 (collectively known as the ToolShell exploits), Storm-2603 has orchestrated a wave of attacks deploying both Warlock (a.k.a. X2anylock) and LockBit Black ransomware.
New report finds that in nearly all cases, threat actors target devices weeks before relevant vulnerabilities are made public.

New report finds that in nearly all cases, threat actors target devices weeks before relevant vulnerabilities are made public.

A recent report published by GreyNoise on July 31 has brought new urgency to how organizations view and respond to emerging cyber threats. The study reveals a disconcerting trend: in 80% of observed cases, attackers began targeting enterprise edge devices—such as VPN gateways and firewalls—weeks before relevant vulnerabilities were made public and assigned a Common Vulnerabilities and Exposures (CVE) identifier.
Unprecedented $1 million prize offered at Pwn2Own Ireland 2025 for zero-click WhatsApp exploit.

Unprecedented $1 million prize offered at Pwn2Own Ireland 2025 for zero-click WhatsApp exploit.

In a groundbreaking move for cybersecurity research, Trend Micro’s Zero Day Initiative (ZDI), with co-sponsorship from Meta, has announced an unprecedented $1 million prize for a successful zero-click exploit targeting WhatsApp at Pwn2Own Ireland 2025. This event, scheduled for October 21–24, 2025, in Cork, Ireland, sets a new record for the highest single bounty offered in the history of the prestigious hacking contest.
Flashpoint 2025 midyear threat intelligence shows worrying surge in credential theft, vulnerabilities, and ransomware attacks.

Flashpoint 2025 midyear threat intelligence shows worrying surge in credential theft, vulnerabilities, and ransomware attacks.

Flashpoint’s 2025 Midyear Threat Intelligence Index paints a compelling, and deeply concerning, picture of the current cyber risk environment. According to the report, organizations worldwide are contending with unprecedented rises in credential theft, vulnerability disclosures, and ransomware incidents—each amplifying the overall threat landscape.
Chinese researchers are exploring ways to disable SpaceX’s Starlink satellites including lasers and direct energy weapons.

Chinese researchers are exploring ways to disable SpaceX’s Starlink satellites including lasers and direct energy weapons.

Recent academic publications from China detail a growing concern among Chinese defense analysts over the expanding reach and capabilities of SpaceX’s Starlink satellite network. The constellation, now numbering thousands of low-orbit satellites, has garnered global attention for its dual utility as both a commercial broadband revolutionary and a tool with significant military implications.
Researchers release free decryptor for FunkSec ransomware.

Researchers release free decryptor for FunkSec ransomware.

In a significant win for cybersecurity, experts from Avast, in collaboration with international law enforcement agencies including the European Cybercrime Centre, have developed and released a free decryptor to assist victims of the notorious FunkSec ransomware. The release follows the successful neutralization of the ransomware’s infrastructure, offering much-needed relief to individuals and organizations impacted by this sophisticated threat.
China summons Nvidia over alleged security backdoors in AI chips shipped to the Chinese market.

China summons Nvidia over alleged security backdoors in AI chips shipped to the Chinese market.

Nvidia has found itself at the center of escalating technological tensions between the United States and China. Chinese authorities formally summoned Nvidia executives to address concerns about potential "backdoor" security vulnerabilities in the company’s H20 artificial intelligence chips, specifically developed for the Chinese market. The Cyberspace Administration of China (CAC) announced it had interviewed Nvidia officials, demanding explanations and supporting evidence related to these suspected vulnerabilities.