A sophisticated new malware campaign targeting Near Field Communication (NFC) payment systems has emerged as a significant global cybersecurity threat, transforming what began as a localized attack in Eastern Europe into a worldwide phenomenon. The malicious operation, first identified by…
Category: Cyber Security News
Microsoft Teams to Set Employee’s Work Locations Based on Organization’s Wi-Fi Network
Microsoft has announced a significant enhancement to Teams that will automatically detect and set employees’ work locations based on their connection to organizational Wi-Fi networks. This innovative feature, scheduled for general availability in early September 2025, represents a major advancement…
Weaponized DeepSeek Installers Delivers Sainbox RAT and Hidden Rootkit
Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting the popularity of artificial intelligence tools to target Chinese-speaking users. The attack leverages fake installers masquerading as legitimate software downloads, including the popular AI chatbot DeepSeek, to deploy advanced persistent threats…
KC Man Hacked Computers to Pitch For Cybersecurity Services Pleaded Guilty
A Kansas City man has admitted to infiltrating a nonprofit organization’s computer network using sophisticated hacking techniques in what authorities describe as an elaborate scheme to demonstrate cybersecurity vulnerabilities. Nicholas Michael Kloster, 32, pleaded guilty on Wednesday to federal computer…
Let’s Encrypt to Issue Certificate for IP Address With 6-Day Validity
Let’s Encrypt, the world’s largest certificate authority, announced its readiness to begin issuing SSL/TLS certificates for IP addresses through its production environment, marking a significant advancement in internet security infrastructure. The certificates will be available exclusively under the organization’s short-lived…
Cybercriminals Leveraging CapCut Popularity to Harvest Apple ID Credentials & Credit Card Data
Cybercriminals have begun exploiting the widespread popularity of CapCut, the dominant short-form video editing application, to orchestrate sophisticated phishing campaigns targeting Apple ID credentials and credit card information. This emerging threat demonstrates how attackers strategically leverage trending applications to enhance…
Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials
A sophisticated new malware campaign targeting macOS users has emerged, employing deceptive “Clickfix” tactics to distribute malicious AppleScripts designed to harvest sensitive user credentials and financial data. The campaign leverages typosquatted domains that closely mimic legitimate finance platforms and Apple…
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition
A critical pre-authentication denial of service vulnerability was identified as CVE-2025-6709, affecting multiple versions of MongoDB Server across its 6.0, 7.0, and 8.0 release branches. Summary1. MongoDB CVE-2025-6709 allows unauthenticated attackers to crash servers (CVSS 7.5).2. Malicious JSON payloads with…
Windows 11 Retires Blue Screen of Death Error Replaces With Black Screen
Microsoft is retiring one of computing’s most recognizable error messages after nearly four decades. The iconic Blue Screen of Death (BSOD) that has haunted Windows users since the 1980s will be replaced with a streamlined Black Screen of Death as part…
Threat Actors Embed Malware on Windows System’s Task Scheduler to Maintain Persistence
A sophisticated cyber attack targeting critical national infrastructure in the Middle East has revealed how threat actors are leveraging Windows Task Scheduler to maintain persistent access to compromised systems. The attack involves a malicious variant of the Havoc framework, a…
ClickFix Attack Emerges by Over 500% – Hackers Actively Using This Technique to Trick Users
A sophisticated new social engineering technique called ClickFix has exploded across the cyberthreat landscape, experiencing an unprecedented surge of 517% between the second half of 2024 and the first half of 2025. This alarming growth has propelled ClickFix to become…
APT-C-36 Hackers Attacking Government Institutions, Financial Organizations, and Critical Infrastructure
Since 2018, the advanced persistent threat group APT-C-36, commonly known as Blind Eagle, has emerged as a formidable cyber adversary targeting critical sectors across Latin America. This sophisticated threat actor has demonstrated persistent focus on Colombian organizations, launching coordinated attacks…
Mitsubishi Electric AC Systems Vulnerability Allows Remote Control Without User Interaction
Mitsubishi Electric has disclosed a critical authentication bypass vulnerability affecting 27 different air conditioning system models, potentially allowing remote attackers to gain unauthorized control over building HVAC systems. The vulnerability, tracked as CVE-2025-3699, carries a maximum CVSS score of 9.8,…
WhatsApp to Add AI-Powered Message Summaries to Quickly Catch Your Messages
WhatsApp has unveiled a groundbreaking new feature that leverages artificial intelligence to help users quickly navigate their unread messages. The messaging platform announced on June 25, 2025, the introduction of Message Summaries, an AI-driven tool designed to provide instant overviews…
Iranian APT35 Hackers Attacking High-Profile Cyber Security Experts & Professors from Israel
A sophisticated spear-phishing campaign targeting Israeli cybersecurity experts and computer science professors has emerged amid escalating tensions between Iran and Israel. The Iranian threat group Educated Manticore, widely associated with the Islamic Revolutionary Guard Corps’ Intelligence Organization, has launched precision…
Microsoft 365’s Direct Send Exploited to Send Phishing Emails as Internal Users
A sophisticated phishing campaign affecting more than 70 organizations by exploiting Microsoft 365’s Direct Send feature. This novel attack method allows threat actors to spoof internal users and deliver phishing emails without ever needing to compromise an account, bypassing traditional…
HPE OneView for VMware vCenter Allows Escalation of Privileges
A significant security vulnerability in Hewlett-Packard Enterprise OneView for VMware vCenter (OV4VC) platform that could allow attackers with limited access to escalate their privileges to administrative levels. The vulnerability, tracked as CVE-2025-37101, affects all versions of the software prior to…
Iranian Spear-Phishing Attack Mimic Google, Outlook, and Yahoo Domains
A sophisticated Iranian cyber espionage campaign has resurfaced with renewed intensity, targeting high-profile figures through meticulously crafted spear-phishing operations that impersonate major email providers including Google, Outlook, and Yahoo. The campaign, attributed to the threat actor known as Educated Manticore,…
Researchers Obfuscated & Weaponized .NET Assemblies Using MacroPack
The cybersecurity landscape has witnessed a significant evolution in malware sophistication, with threat actors increasingly leveraging legitimate programming frameworks for malicious purposes. A recent development has emerged involving the weaponization of .NET assemblies through advanced obfuscation techniques, marking a concerning…
CISA Warns of D-Link Path Traversal Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical path traversal vulnerability affecting D-Link DIR-859 routers that is being actively exploited in the wild. The vulnerability, designated as CVE-2024-0769, was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on June…