NV Energy’s bill pricing switch, Greenlink construction costs OK’d by regulators

NV Energy’s bill pricing switch, Greenlink construction costs OK’d by regulators Summary Starting in April, NV Energy will bill all Southern Nevada residential customers using daily demand charges — charging based on the single highest 15-minute period of usage each day rather than solely on total monthly consumption. The demand charge will be calculated by […]

Read More →

Emerging Yurei Ransomware Claims First Victims

Emerging Yurei Ransomware Claims First Victims Summary Yurei is a recently observed ransomware operator that has already leaked stolen data from several victims, including Sri Lanka’s MidCity Marketing, and additional targets in India and Nigeria. Researchers at Check Point say Yurei uses a lightly modified variant of the open-source Prince-Ransomware (written in Go), which lowers […]

Read More →

Innovative FileFix Phishing Attack Proves Plenty Potent

Innovative FileFix Phishing Attack Proves Plenty Potent Summary This article from Dark Reading describes a sophisticated, globe-spanning phishing campaign built on the recently publicised FileFix technique. Attackers have rapidly weaponised FileFix—an evolution of ClickFix—using convincing brand impersonation (notably Facebook/Meta), heavy code obfuscation, and steganography to smuggle additional payloads inside images. The final payload often deploys […]

Read More →

‘Vane Viper’ Threat Group Tied to PropellerAds, Commercial Entities

‘Vane Viper’ Threat Group Tied to PropellerAds, Commercial Entities Summary Infoblox research reveals that a long-running cybercrime operation dubbed “Vane Viper” is tightly linked to PropellerAds and its parent AdTech Holding. The operation uses hundreds of thousands of compromised sites and malicious advertising to redirect users into exploit kits, malware droppers, botnets, scams and ransomware. […]

Read More →

Self-Replicating ‘Shai-hulud’ Worm Targets NPM Packages

Self-Replicating ‘Shai-hulud’ Worm Targets NPM Packages Summary Shai-hulud is a newly observed self-replicating worm that has infected hundreds of NPM packages. First detected by ReversingLabs on 15 September 2025, the worm installs an info-stealer that harvests tokens, credentials and secrets from developer environments, then uses stolen NPM access to publish poisoned versions of other packages […]

Read More →

Critical Bugs in Chaos Mesh Enable Cluster Takeover

Critical Bugs in Chaos Mesh Enable Cluster Takeover Summary Researchers at JFrog discovered four vulnerabilities in the Chaos Mesh chaos-engineering platform that can be chained to take over Kubernetes clusters. Dubbed “Chaotic Deputy,” three of the flaws (CVE-2025-59360, CVE-2025-59361, CVE-2025-59359) are critical command-injection issues (CVSS 9.8) allowing execution of arbitrary OS commands on pods; the […]

Read More →

Ray Security Takes an Active Data Security Approach

Ray Security Takes an Active Data Security Approach Summary Ray Security, a startup founded in 2024, emerged from stealth with $11 million in funding to tackle modern data security challenges by shifting from visibility-focused tooling to action-oriented protection. The platform uses a proprietary AI engine to predict where sensitive data will be accessed and applies […]

Read More →