Zig Strike is a sophisticated offensive toolkit designed to bypass advanced security solutions, including Anti-Virus (AV), Next-Generation Antivirus (NGAV), and Endpoint Detection and Response (XDR/EDR) systems. This open-source toolkit represents a significant evolution in red team capabilities, leveraging the modern Zig programming…
Category: Cyber Security News
RansomHub Ransomware Attacking RDP Servers Using Mimikatz and Advanced IP Scanner Tools
A recent incident response investigation from THE DFIR report has revealed the sophisticated tactics employed by RansomHub ransomware operators in a coordinated attack campaign that compromised an entire corporate network through an exposed Remote Desktop Protocol (RDP) server. The attack,…
Scattered Spider Hackers Actively Attacking Aviation and Transportation Firms
Cybersecurity experts and federal authorities are sounding urgent alarms as the notorious Scattered Spider hackers have pivoted to targeting the aviation and transportation sectors, marking a dangerous escalation in their operations. The FBI has confirmed that the cybercriminal group, also…
25 Best Managed Security Service Providers (MSSP) in 2025
Managed Security Service Providers (MSSPs) are specialized companies that deliver outsourced cybersecurity services to protect businesses from evolving cyber threats. These providers offer a range of services, including 24/7 threat monitoring, incident response, vulnerability management, and compliance support. MSSPs help…
Beware of Trending TikTok Videos That Promotes Pirated Apps Deliver Stealer Malware
Cybercriminals have discovered a new frontier for malware distribution by weaponizing TikTok’s massive user base and algorithmic reach. A sophisticated social engineering campaign has emerged that leverages AI-generated videos to trick users into downloading dangerous information-stealing malware disguised as software…
Threat Actors Behind GIFTEDCROOK Stealer Coverted It To an Intelligence-Gathering Tool
The cyber-espionage landscape targeting Ukraine has witnessed a significant evolution with the transformation of GIFTEDCROOK malware from a rudimentary browser credential stealer into a sophisticated intelligence-gathering platform. Initially discovered as a basic infostealer in early 2025, this malware has undergone…
Threat Actors Exploiting Windows & Linux Servers Vulnerability to Deploy Web Shell
A sophisticated cyber attack campaign targeting South Korean web servers has emerged, with threat actors deploying MeshAgent and SuperShell malware to compromise both Windows and Linux infrastructure. The multi-platform assault demonstrates an escalation in attack complexity, as adversaries leverage file…
ESET Warns of NFC Data for Contactless Payments Emerges as Cybercrime Target
A sophisticated new malware campaign targeting Near Field Communication (NFC) payment systems has emerged as a significant global cybersecurity threat, transforming what began as a localized attack in Eastern Europe into a worldwide phenomenon. The malicious operation, first identified by…
Microsoft Teams to Set Employee’s Work Locations Based on Organization’s Wi-Fi Network
Microsoft has announced a significant enhancement to Teams that will automatically detect and set employees’ work locations based on their connection to organizational Wi-Fi networks. This innovative feature, scheduled for general availability in early September 2025, represents a major advancement…
Weaponized DeepSeek Installers Delivers Sainbox RAT and Hidden Rootkit
Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting the popularity of artificial intelligence tools to target Chinese-speaking users. The attack leverages fake installers masquerading as legitimate software downloads, including the popular AI chatbot DeepSeek, to deploy advanced persistent threats…
KC Man Hacked Computers to Pitch For Cybersecurity Services Pleaded Guilty
A Kansas City man has admitted to infiltrating a nonprofit organization’s computer network using sophisticated hacking techniques in what authorities describe as an elaborate scheme to demonstrate cybersecurity vulnerabilities. Nicholas Michael Kloster, 32, pleaded guilty on Wednesday to federal computer…
Let’s Encrypt to Issue Certificate for IP Address With 6-Day Validity
Let’s Encrypt, the world’s largest certificate authority, announced its readiness to begin issuing SSL/TLS certificates for IP addresses through its production environment, marking a significant advancement in internet security infrastructure. The certificates will be available exclusively under the organization’s short-lived…
Cybercriminals Leveraging CapCut Popularity to Harvest Apple ID Credentials & Credit Card Data
Cybercriminals have begun exploiting the widespread popularity of CapCut, the dominant short-form video editing application, to orchestrate sophisticated phishing campaigns targeting Apple ID credentials and credit card information. This emerging threat demonstrates how attackers strategically leverage trending applications to enhance…
Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials
A sophisticated new malware campaign targeting macOS users has emerged, employing deceptive “Clickfix” tactics to distribute malicious AppleScripts designed to harvest sensitive user credentials and financial data. The campaign leverages typosquatted domains that closely mimic legitimate finance platforms and Apple…
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition
A critical pre-authentication denial of service vulnerability was identified as CVE-2025-6709, affecting multiple versions of MongoDB Server across its 6.0, 7.0, and 8.0 release branches. Summary1. MongoDB CVE-2025-6709 allows unauthenticated attackers to crash servers (CVSS 7.5).2. Malicious JSON payloads with…
Windows 11 Retires Blue Screen of Death Error Replaces With Black Screen
Microsoft is retiring one of computing’s most recognizable error messages after nearly four decades. The iconic Blue Screen of Death (BSOD) that has haunted Windows users since the 1980s will be replaced with a streamlined Black Screen of Death as part…
Threat Actors Embed Malware on Windows System’s Task Scheduler to Maintain Persistence
A sophisticated cyber attack targeting critical national infrastructure in the Middle East has revealed how threat actors are leveraging Windows Task Scheduler to maintain persistent access to compromised systems. The attack involves a malicious variant of the Havoc framework, a…
ClickFix Attack Emerges by Over 500% – Hackers Actively Using This Technique to Trick Users
A sophisticated new social engineering technique called ClickFix has exploded across the cyberthreat landscape, experiencing an unprecedented surge of 517% between the second half of 2024 and the first half of 2025. This alarming growth has propelled ClickFix to become…
APT-C-36 Hackers Attacking Government Institutions, Financial Organizations, and Critical Infrastructure
Since 2018, the advanced persistent threat group APT-C-36, commonly known as Blind Eagle, has emerged as a formidable cyber adversary targeting critical sectors across Latin America. This sophisticated threat actor has demonstrated persistent focus on Colombian organizations, launching coordinated attacks…
Mitsubishi Electric AC Systems Vulnerability Allows Remote Control Without User Interaction
Mitsubishi Electric has disclosed a critical authentication bypass vulnerability affecting 27 different air conditioning system models, potentially allowing remote attackers to gain unauthorized control over building HVAC systems. The vulnerability, tracked as CVE-2025-3699, carries a maximum CVSS score of 9.8,…