A sophisticated malware campaign dubbed Shadow Vector is actively targeting users in Colombia through malicious Scalable Vector Graphics (SVG) files that act as decoys for deploying dangerous remote access tools. The campaign distributes spear-phishing emails impersonating trusted Colombian institutions, particularly…
Category: Cyber Security News
North Korean Hackers Weaponizes Github Infrastructure Used to Deliver Malware
A sophisticated cyber espionage campaign has emerged, demonstrating how North Korean threat actors are increasingly leveraging legitimate cloud platforms to distribute malware and establish persistent command and control infrastructure. Security researchers have uncovered a complex spearphishing operation that exploits GitHub’s…
DDoS Attack Crippling Financial Sectors, Leds to Multi-Day Outages
Recent DDoS attacks have evolved from mere nuisances to strategic threats capable of paralyzing financial institutions for extended periods. The financial services sector has emerged as the primary target of these sophisticated attacks, which are designed to overwhelm digital infrastructure…
Microsoft Family Safety Blocking All the Version of Chrome Browsers
Microsoft Family Safety’s recent update has triggered an unexpected system-wide blocking of Google Chrome browsers across all versions, creating significant operational challenges for educational institutions and families utilizing Windows devices with parental controls enabled. The issue, which emerged on June…
Microsoft Limits Windows 11 24H2 Restore Points From 90 to 60 Days
Microsoft has implemented a significant change to its Windows 11 system recovery functionality, reducing the retention period for system restore points from 90 days to 60 days in the latest security update. This modification affects Windows 11 version 24H2 users…
CoinMarketCap Doodle Image Vulnerability Triggered Malicious Code Through an API Call
CoinMarketCap, one of the world’s leading cryptocurrency data platforms, experienced a security vulnerability on June 20, 2025, when a doodle image on their homepage contained malicious code that triggered unauthorized API calls, resulting in unexpected pop-ups for users. The company’s…
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages
A critical security vulnerability has been discovered in Meshtastic firmware that could allow attackers to decrypt private messages sent between devices. The flaw, assigned a CVSS score of 9.5 out of 10, affects all versions above 2.5.0 and stems from…
Windows Screencast Snipping Tool Allow Users to Export Captures as GIF
Microsoft has begun rolling out a significant update to the Windows Snipping Tool that enables users to export screen recordings as GIF files, marking a notable enhancement to the productivity toolkit available on Windows 11. The new functionality, designated as…
SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play
Cybersecurity researchers have uncovered a sophisticated new spyware campaign called SparkKitty that has successfully infiltrated both Apple’s App Store and Google Play Store, marking a significant escalation in mobile malware distribution through official channels. This Trojan spy represents the latest…
BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware
A sophisticated social engineering campaign leveraging the trusted Zoom platform has emerged as the latest weapon in the arsenal of North Korean state-sponsored hackers. The BlueNoroff group, a financially motivated subgroup of the notorious Lazarus Group, has been orchestrating targeted…
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls
The UK’s National Cyber Security Centre (NCSC) has issued a critical warning about a sophisticated malware campaign dubbed “UMBRELLA STAND” that specifically targets internet-facing Fortinet FortiGate 100D series firewalls. This newly identified threat represents a significant escalation in attacks against…
Amazon EKS Vulnerabilities Expose Sensitive AWS Credentials and Escalate Privileges
Critical vulnerabilities in Amazon Elastic Kubernetes Service (EKS) allow overprivileged containers to expose sensitive AWS credentials through packet sniffing and API spoofing attacks. The investigation, published on June 19, 2025, demonstrates how misconfigured containers can facilitate unauthorized access and privilege…
Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches
In our fast-paced, interconnected world, the dangers of cyberattacks are becoming more frequent and complex. That’s why it’s more important than ever to stay updated and aware of the risks. Every week, our newsletter offers a simple roundup of the…
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS
A threat actor has reportedly put up for sale a sophisticated FortiGate API exploit tool on a dark web marketplace, igniting significant concern within the cybersecurity community. The tool, which is being marketed for a price of $12,000 and comes…
Critical OpenVPN Driver Vulnerability Allows Attackers to Crash Windows Systems
A critical buffer overflow vulnerability in OpenVPN’s data channel offload driver for Windows has been discovered, allowing local attackers to crash Windows systems by sending maliciously crafted control messages. The vulnerability, identified as CVE-2025-50054, affects the ovpn-dco-win driver versions 1.3.0…
DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats
DuckDuckGo has significantly upgraded its Scam Blocker feature to protect users against a broader range of digital threats, including sham e-commerce platforms, fake cryptocurrency exchanges, and “scareware” tactics. This enhancement comes as consumers reported $12.5 billion in fraud losses to…
How Smart Timesheet Software Is Changing the Way of Work
As an employee have been managing projects in remote, hybrid, and traditional work environments, employees have always faced the same challenge: the inability to understand where time, actually is spent. Regular tasks are not completed on time as they are…
Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank
Microsoft has acknowledged a significant bug affecting OneDrive personal accounts that is causing search results to appear blank, preventing users from locating files they know exist within their cloud storage. The tech giant is actively investigating the issue, which appears…
Microsoft Announces New Security Defaults for Windows 365 Cloud PCs
Microsoft unveiled significant security enhancements for Windows 365 Cloud PCs on June 18, 2025, introducing new default configurations that prioritize data protection and system integrity. The updates include disabling clipboard, drive, USB, and printer redirections by default, while enabling advanced…
Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency
Cybersecurity researchers have uncovered a significant resurgence of the Prometei botnet, a sophisticated malware operation targeting Linux servers for cryptocurrency mining and credential theft. This latest campaign, observed since March 2025, demonstrates the evolving nature of cryptomining malware and its…