ArmouryLoader burst onto the threat landscape in late 2024 after hijacking the export table of ASUS’s Armoury Crate utility, turning a trusted gaming companion into an initial entry point for sophisticated malware campaigns. Since then, security teams have watched a…
Category: Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence
The difference between a minor security incident and a devastating breach often comes down to one critical factor: how quickly you can detect and respond to a threat. Hackers rarely target an isolated business: they typically launch campaigns that hit…
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets
Over the past year, a previously quiet Chinese threat cluster has surged onto incident-response dashboards worldwide, pivoting from single zero-day hits to an industrialized pipeline of weaponized vulnerabilities. First detected targeting unpatched Fortinet SSL-VPN appliances in late-2024, the group—dubbed “Goujian…
Orange Hit by Cyberattack – A French Telecom Giant’s Internal Systems Hacked
France’s leading telecommunications giant Orange confirmed on Monday that it detected a significant cyberattack targeting one of its information systems on Friday, July 25, 2025. The incident has resulted in widespread service disruptions affecting both corporate customers and consumer services,…
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed
Multiple critical vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting persistent security flaws in network infrastructure devices. The vulnerabilities, designated CVE-2025-40596, CVE-2025-40597, and CVE-2025-40598, demonstrate fundamental programming errors that enable pre-authentication attacks against firmware version 10.2.1.15. Key Takeaways1. Stack overflow,…
Critical CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks
A critical security vulnerability has been discovered in CodeIgniter4’s ImageMagick handler, exposing potentially millions of web applications to command injection attacks through malicious file uploads. The vulnerability, tracked as CVE-2025-54418, received a CVSS score of 9.8, indicating the highest severity…
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time
Microsoft Teams is rolling out a significant enhancement to its meeting experience with the introduction of a new meeting join banner designed to streamline user access to scheduled meetings. The feature, identified by message code MC1115979, represents Microsoft’s continued effort…
npm ‘is’ Package With 2.8M Weekly Downloads Weaponized to Attack Developers
The latest wave of npm-centric phishing has taken a darker turn with the hijack of the ubiquitous is utility, a module pulled 2.8 million times every week. On 19 July 2025 attackers, armed with stolen maintainer credentials, slipped malicious versions…
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems
A critical security vulnerability discovered in Google’s Gemini CLI tool allowed attackers to execute arbitrary malicious commands on developer systems without detection. The vulnerability, identified by cybersecurity firm Tracebit on June 27, 2025, exploited a combination of prompt injection techniques,…
PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI Site
The Python Package Index (PyPI) has issued an urgent warning to developers about an ongoing phishing campaign that exploits domain spoofing techniques to steal user credentials. This sophisticated attack targets developers who have published packages on the official repository, leveraging…
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure
Singapore’s critical infrastructure faces an escalating cyber threat from UNC3886, a sophisticated Chinese state-linked Advanced Persistent Threat (APT) group that has been systematically targeting the nation’s energy, water, telecommunications, finance, and government sectors. The group, which first emerged circa 2021…
Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information
The commodity infostealer landscape has a new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API to spirit away victims’ browser secrets. First seen in mid-July 2025 on a GitHub repository operated by the self-styled ZeroTrace…
Linux 6.16 Released – Optimized for Better Performance and Networking
The Linux Foundation has officially released Linux kernel 6.16 on July 27, 2025, marking another milestone in open-source operating system development. Released by Linus Torvalds, this version focuses on stability improvements and networking enhancements while maintaining the project’s commitment to…
Apple’s New Containerization Feature Allows Kali Linux Integration on macOS
Apple quietly slipped a game-changing developer feature into its WWDC 25 announcements: a native containerization stack that lets Macs run Open Container Initiative (OCI) images inside ultra-lightweight virtual machines. In practice, that means you can launch a full Kali Linux…
CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical vulnerability in PaperCut NG/MF print management software that threat actors are actively exploiting in ransomware campaigns. The vulnerability, tracked as CVE-2023-2533, represents a significant security risk to organizations worldwide using the…
10 Best Virtual Machine (VM) Monitoring Tools in 2025
VM (Virtual Machine) monitoring tools are essential for maintaining the performance, availability, and security of virtualized environments. These tools provide real-time visibility into VM health and performance, enabling administrators to track key metrics such as CPU usage, memory utilization, disk…
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remote Control
Cybersecurity researchers have uncovered a sophisticated web shell attack targeting Microsoft Internet Information Services (IIS) servers, allowing threat actors to achieve complete remote control over compromised systems. The malicious script, identified as “UpdateChecker.aspx,” represents a significant escalation in web shell…
Critical macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC
A critical macOS vulnerability enables attackers to bypass Transparency, Consent, and Control (TCC) protections and steal sensitive user data, including files from protected directories and Apple Intelligence caches. The vulnerability, dubbed “Sploitlight,” exploits Spotlight plugins to access normally protected information…
10 Best Anti-Phishing Tools in 2025
Anti-phishing tools are essential cybersecurity solutions designed to detect and prevent phishing attacks. These tools identify and block malicious emails, websites, and messages that attempt to deceive users into disclosing sensitive information such as passwords, credit card numbers, and personal…
CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding two critical injection vulnerabilities in Cisco’s Identity Services Engine (ISE) that threat actors are actively exploiting. The vulnerabilities, tracked as CVE-2025-20281 and CVE-2025-20337, allow attackers to achieve remote code execution with root privileges…