A sophisticated supply chain attack targeting JavaScript developers emerged on Friday, July 18th, 2025, when cybercriminals compromised multiple popular npm packages to distribute the newly identified “Scavenger” malware. The attack primarily focused on eslint-config-prettier, a widely-used code formatting package, along…
Category: Cyber Security News
Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network
A groundbreaking investigation has pulled back the curtain on one of Russia’s most clandestine intelligence operations, revealing unprecedented details about the Federal Security Service’s (FSB) 16th Center and its extensive signals intelligence network. The research, conducted by CheckFirst analysts over…
Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet
Cybersecurity researchers have uncovered a sophisticated attack campaign targeting poorly managed Linux servers through SSH brute force attacks to deploy the SVF Botnet, a Python-based distributed denial-of-service malware. The malware leverages Discord as its command-and-control infrastructure and employs multiple proxy…
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
A sophisticated phishing campaign targeting Web3 developers has emerged, exploiting the growing interest in artificial intelligence platforms to deliver credential-stealing malware. The threat actor LARVA-208, previously known for targeting IT staff through phone-based social engineering, has pivoted to focus on…
How to Conduct a Secure Code Review – Tools and Techniques
Secure code review represents a critical security practice that systematically examines software source code to identify and remediate security vulnerabilities before they reach production environments. This comprehensive examination serves as a proactive defense mechanism, enabling development teams to detect security…
Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors
[London, UK] July 2025 – As cryptocurrency continues its evolution into a mainstream financial asset class, a growing number of investors are turning to new strategies for generating yield—without the risks of high-frequency trading. Addressing this demand, UK-based Quid Miner…
How to Use Threat Intelligence to Enhance Cybersecurity Operations
Threat intelligence represents a paradigm shift from reactive to proactive cybersecurity, providing organizations with actionable insights to detect, prevent, and respond to cyber threats more effectively. By leveraging structured data about current and emerging threats, security teams can make informed…
Securing Virtualized Environments – Hypervisor Security Best Practices
Hypervisor security represents a critical foundation for protecting virtualized infrastructure, as a single compromise at the hypervisor level can potentially expose all virtual machines running on that host. The security of virtualized environments depends on implementing comprehensive hardening measures across…
Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities
The OWASP Top 10 2021 represents the most critical web application security risks facing organizations today, with significant shifts reflecting the evolving threat landscape. Broken Access Control has risen to the top position, affecting 94% of tested applications. At the…
Exclusive! Threat Intelligence That Powers Best SOCs Worldwide Is Now Free
Quality threat intelligence has traditionally been the domain of enterprise-level budgets and premium subscriptions. The kind of fresh, actionable data that transforms how SOCs operate has remained frustratingly out of reach for many organizations. Until now. A Game-Changing Opportunity For…
Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data
The rise of clandestine “travel agencies” on darknet forums has reshaped the cyber-crime landscape, morphing traditional card-skimming into a full-fledged service economy that sells half-priced flights, five-star hotels, and even yacht charters. What unsuspecting buyers see as a bargain is…
UK Confirms Ban of Ransomware Payments to Public and Critical National Infrastructure Sectors
The UK government has announced comprehensive measures to tackle ransomware attacks, with public sector organizations and critical national infrastructure operators facing an outright ban on paying ransom demands to cyber criminals. This landmark decision, supported by nearly three-quarters of consultation…
Apache Jena Vulnerability Leads to Arbitrary File Access or Manipulation
Apache Jena has disclosed two significant security vulnerabilities affecting versions through 5.4.0, prompting an immediate upgrade recommendation to version 5.5.0. Both CVE-2025-49656 and CVE-2025-50151, announced on July 21, 2025, represent important severity flaws that exploit administrative access to compromise server…
Iran’s Cyber Actors Attacking Global Airlines to Exfiltrate Sensitive Data
The breach of Tehran-based security contractor Amnban has ripped the cover off a multi-year espionage program that quietly burrowed into airline reservation systems across Africa, Europe, and the Middle East. Internal documents and screen-captured videos obtained by investigatory journalist Nariman…
Threat Actors Allegedly Selling macOS 0-day LPE Exploit on Hacker Forums
A threat actor known as “skart7” is allegedly offering a zero-day Local Privilege Escalation (LPE) exploit targeting Apple’s macOS operating system for sale on a prominent hacker forum. This development represents a significant security concern for macOS users, particularly those…
CISA Warns of Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems
The Cybersecurity and Infrastructure Security Agency (CISA), FBI, Department of Health and Human Services, and Multi-State Information Sharing and Analysis Center have issued an urgent joint advisory warning of escalating attacks by the Interlock ransomware group, which has been targeting…
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution
Multiple security vulnerabilities affecting Sophos firewall products, with two enabling pre-authentication remote code execution that could allow attackers to compromise systems without valid credentials. The vulnerabilities, tracked as CVE-2025-6704, CVE-2025-7624, CVE-2025-7382, CVE-2024-13974, and CVE-2024-13973, impact various configurations of Sophos Firewall…
New DCHSpy Android Malware Steals WhatsApp Data, Call Logs, Record Audio and Take Photos
A sophisticated new variant of DCHSpy Android surveillanceware, deployed by the Iranian cyber espionage group MuddyWater just one week after escalating tensions in the Israel-Iran conflict. This malicious tool represents a significant evolution in mobile surveillance capabilities, targeting sensitive communications…
UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details
The UK Government has imposed sanctions on Russian military intelligence units and 18 individuals following the exposure of a sophisticated cyber espionage campaign targeting Microsoft cloud services. The National Cyber Security Centre (NCSC) revealed that the Russian Advanced Persistent Threat…
Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild
Cisco Systems has issued a critical security advisory warning of multiple remote code execution vulnerabilities in its Identity Services Engine (ISE) that are being actively exploited by attackers in the wild. The vulnerabilities, carrying the maximum CVSS severity score of…