Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
“Key actors involved in the Kimwolf botnet are observed monetizing the botnet through app installs, selling residential proxy bandwidth, and selling its DDoS functionality,” the company said in an analysis published last week.
Kimwolf
Ledger customers impacted by third-party Global-e data breach
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws.
The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek.
Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome
NordVPN denies breach claims, says attackers have “dummy data”
⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
This week’s stories share one pattern. Nothing flashy. No single moment. Just steady abuse of trust — updates, extensions,
Kimwolf Android Botnet Grows Through Residential Proxy Networks
The 2-million-device-strong botnet allows monetization through DDoS attacks, app installs, and the selling of proxy bandwidth.
The post Kimwolf Android Botnet Grows Through Residential Proxy Networks appeared first on SecurityWeek.
Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day.
The post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek.
The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations
Cybersecurity is being reshaped by forces that extend beyond individual threats or tools. As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture, trust, and execution speed.
This report examines how core areas of cybersecurity are evolving in
