Category: Cyber Security News

Indirect Prompt Injection Leverage LLMs as They Lack Informational Context

Cybersecurity researchers have identified a growing threat vector targeting artificial intelligence systems through a technique known as indirect prompt injection. Unlike traditional attacks that directly manipulate an LLM’s user interface, these sophisticated attacks embed malicious instructions within external content that…

Hackers Attacking Windows IIS Web Server With Native Module Malware

A sophisticated attack campaign targeting Windows IIS web servers with stealthy malicious native modules.  Researchers observed Chinese-speaking threat actors deploying advanced IIS malware against South Korean web servers, allowing attackers to intercept and manipulate all incoming web traffic while remaining…

The Rise of Ransomware – Strategies to Protect Your Systems

Ransomware has emerged as one of the digital age’s most pervasive and financially devastating cyber threats. In 2024, organizations globally faced unprecedented challenges, with 59% reporting ransomware attacks in the past year, a 13% increase over five years. The average…

New Spam Campaign Abuses Remote Monitoring Tools to Attack Organizations

A sophisticated spam campaign targeting Brazilian organizations has emerged, exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access to corporate networks. Discovered in early 2025, this attack campaign specifically targets Portuguese-speaking users through deceptive emails that trick…

Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters

Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass security filters, potentially exposing underlying web applications to various attacks. The vulnerabilities, tracked as CVE-2024-56523 and CVE-2024-56524, were publicly disclosed…

IXON VPN Client Vulnerability Let Attackers Escalate Privileges

Significant vulnerabilities in the IXON VPN Client allow local attackers to gain system-level privileges on Windows, Linux, and macOS systems.  The flaws, tracked as CVE-2025-26168 and CVE-2025-26169, affect versions prior to 1.4.4 and could grant unauthorized users complete control over…

Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details

A significant vulnerability in Microsoft Bookings allowed attackers to manipulate meeting details by exploiting insufficient input validation.  The flaw, which Microsoft has largely remedied, enabled malicious actors to inject arbitrary HTML into meeting invitations, alter calendar entries, and potentially facilitate…