TLDR The Shai-Hulud npm attack represents the first successful self-replicating worm in the JavaScript ecosystem. This npm supply chain attack compromised over 180 packages between September 14-16, 2025. The malware …
Tashina
Tashina
Tashina has been an avid cybersecurity writer for many years. She is passionate about cybersecurity and enjoys learning and writing about the latest trends, issues and challenges in the industry.
-
-
TLDR The Django Project has released urgent security updates addressing CVE-2025-57833, a high-severity SQL injection vulnerability in the FilteredRelation feature. The flaw affects Django versions 4.2, 5.1, and 5.2, allowing …
-
Apple has issued emergency security updates addressing a critical zero-day vulnerability tracked as CVE-2025-43300. The vulnerability affects iOS, iPadOS, and macOS systems across millions of devices globally. Security researchers report …
-
The new UK age verification requirements under the Online Safety Act have sparked one of the largest privacy controversies in digital history. With VPN downloads surging over 1,400% since the …
-
The UK’s corporate landscape faces its biggest transformation in decades. From autumn 2025, over 7 million company directors and beneficial owners must prove their identity to Companies House or face …
-
In a significant development for the cybersecurity community, the Cybersecurity and Infrastructure Security Agency (CISA) has officially confirmed continued funding for the MITRE CVE (Common Vulnerabilities and Exposures Programme). This …
-
The recent CrowdStrike incident has been described as one of the worst IT outages in history. This post covers everything you need to know about what happened, its impact, and …
-
Both Cross-Site Request Forgery (CSRF) and Server-side Request Forgery (SSRF) are malicious attacks on web applications that exploit weaknesses in how a web server handles URLs. Despite sharing similarities, CSRF …
-
At Aardwolf Security, our primary goal is to help businesses identify and address vulnerabilities in their IT networks. By conducting a comprehensive network assessment, we can provide valuable insights and …
-
A code review is an essential pillar of quality software development, helping to ensure that the final product not only performs correctly but does so safely and securely. As a …