New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. “Out-of-bounds…

Good SEO Plus Lazy Marketing Won’t Cut It Anymore
|

Good SEO Plus Lazy Marketing Won’t Cut It Anymore

SEO is a playground for creative, scrappy problem-solvers. But today, it’s often reduced to a formula: plug keywords into an AI tool. Run a cookie-cutter checklist to create content. Build links. Hope traffic rolls in.  That used to work. But with AI-powered search on the rise, the era of SEOs as technicians is fading, and the…

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called Netbird to target Chief Financial Officers (CFOs) and financial executives at banks, energy companies, insurers, and investment firms across Europe, Africa, Canada, the Middle East, and South Asia. “In what appears to be a multi-stage phishing operation, the…

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU). Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information….

New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. “This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information,…

Almost Half of Google Searches Are Branded. Here’s Why That Matters
|

Almost Half of Google Searches Are Branded. Here’s Why That Matters

When most marketers think about SEO, they jump straight to keywords like “best running shoes” or “how to do [whatever]”. Non-branded, high-intent, top-of-funnel stuff. But our latest study might surprise you: Nearly half of all Google searches (45.7%) are branded searches—meaning people are actively seeking out specific companies and products they already know. Yep, nearly…

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor. “ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nation-state actor, which affected a very…

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists…

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the App Store is confronted by a wide range of threats that seek to defraud users in various ways, ranging from “deceptive apps designed to steal…

Generative Engines Are Breaking Web Analytics and Hurting Their Future
|

Generative Engines Are Breaking Web Analytics and Hurting Their Future

Search is moving from traditional search engines to generative engines, but traffic from many of these sites isn’t being tracked properly in analytics. It’s their fault, not yours. I was looking at our LLM filter in Ahrefs Web Analytics and noticed some common generative engines missing from the list. They’re in our filters, but we aren’t…

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with an install‑time script that’s triggered during npm install, Socket security researcher Kirill Boychenko said in…

AI Content Marketing 101: Strategies from Someone Who Lives It
|

AI Content Marketing 101: Strategies from Someone Who Lives It

According to our upcoming study, 87% of marketers use AI for content. I’m one of them. AI helped me build a career around writing. It’s part of nearly everything I do. Honestly, I can’t even remember how I worked without it—and I don’t want to. It gives me a “second brain” and superhuman speed, and takes care…