Category: Cyber Security News

Hackers Attacking Windows IIS Web Server With Native Module Malware

A sophisticated attack campaign targeting Windows IIS web servers with stealthy malicious native modules.  Researchers observed Chinese-speaking threat actors deploying advanced IIS malware against South Korean web servers, allowing attackers to intercept and manipulate all incoming web traffic while remaining…

The Rise of Ransomware – Strategies to Protect Your Systems

Ransomware has emerged as one of the digital age’s most pervasive and financially devastating cyber threats. In 2024, organizations globally faced unprecedented challenges, with 59% reporting ransomware attacks in the past year, a 13% increase over five years. The average…

New Spam Campaign Abuses Remote Monitoring Tools to Attack Organizations

A sophisticated spam campaign targeting Brazilian organizations has emerged, exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access to corporate networks. Discovered in early 2025, this attack campaign specifically targets Portuguese-speaking users through deceptive emails that trick…

Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters

Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass security filters, potentially exposing underlying web applications to various attacks. The vulnerabilities, tracked as CVE-2024-56523 and CVE-2024-56524, were publicly disclosed…

IXON VPN Client Vulnerability Let Attackers Escalate Privileges

Significant vulnerabilities in the IXON VPN Client allow local attackers to gain system-level privileges on Windows, Linux, and macOS systems.  The flaws, tracked as CVE-2025-26168 and CVE-2025-26169, affect versions prior to 1.4.4 and could grant unauthorized users complete control over…

Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details

A significant vulnerability in Microsoft Bookings allowed attackers to manipulate meeting details by exploiting insufficient input validation.  The flaw, which Microsoft has largely remedied, enabled malicious actors to inject arbitrary HTML into meeting invitations, alter calendar entries, and potentially facilitate…

Iranian Hackers Impersonate as Model Agency to Attack Victims

In a sophisticated cyber espionage campaign, Iranian threat actors have deployed a fraudulent website impersonating a legitimate German modeling agency to gather intelligence and potentially target specific individuals. The operation, discovered in early May 2025, features advanced visitor profiling techniques…

Detecting Vulnerable Commvault Environments Within Azure Using KQL Query

Cybersecurity analysts are racing to respond to an active exploitation campaign targeting Commvault environments in Microsoft Azure through the recently identified CVE-2025-3928 vulnerability. This critical vulnerability, which enables authenticated attackers to compromise web servers through the creation and execution of…