As the world becomes increasingly reliant on digital infrastructure, data centers have evolved into the backbone of business operations, cloud services, and critical government functions. With projections showing global data center capacity rising sharply over the next decade, the security…
Category: Cyber Security News
XDR In Penetration Testing: Leveraging Advanced Detection To Find Vulnerabilities
Extended Detection and Response (XDR) has emerged as a transformative security technology that unifies visibility across multiple security layers. When applied to penetration testing methodologies, XDR offers unprecedented capabilities for identifying vulnerabilities that might otherwise remain hidden. This article explores…
Top 5 Cybersecurity Risks CISOs Must Tackle in 2025
As we navigate 2025, Chief Information Security Officers (CISOs) must prepare for the Top 5 Cybersecurity Risks emerging from a rapidly evolving threat landscape driven by technological advancements, geopolitical tensions, and increasingly sophisticated attacker tactics.” The role of CISOs has…
Critical Craft CMS RCE 0-Day Vulnerability Exploited in Attacks to Steal Data
According to security researchers at CERT Orange Cyberdefense, a critical remote code execution (RCE) vulnerability in Craft CMS is actively being exploited to breach servers and steal data. The vulnerability, tracked as CVE-2025-32432 and assigned a maximum CVSS score of…
Critical ScreenConnect Vulnerability Let Attackers Inject Malicious Code
ConnectWise has released an urgent security patch for its ScreenConnect remote access software to address a serious vulnerability that could allow attackers to execute malicious code on affected systems. The vulnerability, identified as CVE-2025-3935 and tracked under CWE-287 (Improper Authentication),…
Threat Actors Registered 26k+ Domains Mimic Brands to Trick Users
In a significant escalation of digital deception tactics, threat actors have registered over 26,000 domains in March 2025 alone, designed to impersonate legitimate brands and government services. These malicious domains serve as landing pages for sophisticated smishing (SMS phishing) campaigns,…
New Inception Jailbreak Attack Bypasses ChatGPT, DeepSeek, Gemini, Grok, & Copilot
A pair of newly discovered jailbreak techniques has exposed a systemic vulnerability in the safety guardrails of today’s most popular generative AI services, including OpenAI’s ChatGPT, Google’s Gemini, Microsoft’s Copilot, DeepSeek, Anthropic’s Claude, X’s Grok, MetaAI, and MistralAI. These jailbreaks,…
Russian Hackers Attempting to Sabotage The Digital Control System of a Dutch Public Service
In a concerning development that marks a significant escalation in cyber warfare tactics, Russian hackers have been detected attempting to infiltrate and sabotage the digital control system of a critical Dutch public service. The attack, identified in 2024, represents the…
North Korean Hackers Using GenAI to Get Remote Jobs Around the Globe
In a sophisticated operation that blends social engineering with cutting-edge technology, North Korean operatives have been leveraging generative artificial intelligence tools to secure remote technical positions in companies worldwide. These individuals create compelling digital personas, complete with fabricated credentials and…
6 Best Security Awareness Training Platforms For MSPs in 2025
Managed service providers (MSPs) are increasingly popular cyberattack targets. These entities often have numerous endpoints and distributed networks that create many opportunities for adversaries seeking weaknesses to exploit. Security awareness training is just one aspect of defense efforts, but it…
Hackers Exploiting MS-SQL Servers & Deploy Ammyy Admin for Remote Access
A sophisticated cyberattack campaign targeting vulnerable Microsoft SQL servers has been discovered, aiming to deploy remote access tools and privilege escalation malware. Security researchers have identified that threat actors are specifically exploiting poorly secured MS-SQL instances to install Ammyy Admin,…
Chrome Use-After-Free Vulnerabilities Exploited in the Wild
Google Chrome has faced a series of high-profile security incidents involving Use-After-Free (UAF) vulnerabilities, several of which have been actively exploited in the wild. These flaws, rooted in improper memory management, have become a persistent threat vector for attackers seeking…
SessionShark’ – New Toolkit Attacking Microsoft Office 365 Users’ Bypassing MFA Protections
A sophisticated new phishing toolkit named “SessionShark” has been specifically designed to circumvent Microsoft Office 365’s multi-factor authentication (MFA) protections. SessionShark is being marketed on underground forums as a turnkey phishing-as-a-service (PhaaS) solution. It enables even low-skilled threat actors to…
159 CVEs Exploited in The Wild in Q1 2025, 8.3% of Vulnerabilities Exploited Within 1-Day
In the first quarter of 2025, cybersecurity researchers documented an alarming surge in vulnerability exploitation, with 159 Common Vulnerabilities and Exposures (CVEs) being exploited in the wild. This remarkable figure represents a concerning trend as malicious actors continue to rapidly…
FBI To Offer Reward Up to $10 Million Any Information on Salt Typhoon Hackers
The Federal Bureau of Investigation announced today an unprecedented $10 million reward for actionable intelligence leading to the identification and capture of key operatives behind the infamous Salt Typhoon cyber campaign. This significant cybersecurity effort targets a sophisticated hacking group…
Hackers Allegedly Breach TikTok, Exposing Over 900,000 Usernames & Passwords
A hacking collective identifying itself as R00TK1T has claimed responsibility for a massive data breach affecting TikTok, allegedly exposing the credentials of more than 900,000 users. According to the group’s statements, they have released a sample of 927,000 TikTok user…
New Reports Reveals How AI is Boosting the Phishing Attack Rapidly With More Accuracy
Cybercriminals have dramatically evolved their phishing tactics, leveraging generative AI to create highly personalized and convincing attacks, according to the newly released ThreatLabz 2025 Phishing Report. The days of mass phishing campaigns have given way to hyper-targeted scams designed to…
North Korean APT Hackers Create Companies to Deliver Malware Strains Targeting Job Seekers
A sophisticated North Korean advanced persistent threat (APT) group known as “Contagious Interview” has established elaborate fake cryptocurrency consulting companies to target job seekers with specialized malware. The group, a subunit of the infamous North Korean state-sponsored Lazarus Group, has…
Microsoft’s Symlink Patch Created New Windows DoS Vulnerability
A recent Microsoft security update, intended to patch a critical privilege escalation vulnerability, has inadvertently introduced a new and significant flaw. The fix now enables non-administrative users to effectively block all future Windows security updates, creating a denial-of-service condition. This…
Russian VPS Servers With RDP, Proxy Servers Fuel North Korean Cybercrime Operations
North Korea’s cybercrime operations have significantly expanded beyond the limited 1,024 IP addresses assigned to their national network through an elaborate scheme involving Russian infrastructure. According to recent findings, five Russian IP ranges, primarily located in the border towns of…