Category: Cyber Security News

Stablecoin Bank Hacked – Hackers Stolen $49.5M in Attack

In a high-profile security breach, decentralized finance protocol @0xinfini suffered a $49.5 million USDC theft, marking one of the largest stablecoin exploits of the year.  The attacker executed a multi-stage laundering operation, converting stolen USDC to DAI, purchasing 17,696 ETH…

10 Best DevOps Tools in 2025

The term “DevOps” is a combination of the words “development” and “operations.” Promoting the development and operation processes collectively is a cultural requirement. A single team can now manage the entire application lifecycle, including development, testing, deployment, and operations.  System…

UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory addressing five critical vulnerabilities in its UniFi Protect camera ecosystem, including two flaws enabling unauthenticated remote code execution (RCE) attacks.  The vulnerabilities, discovered during the 2025 Pwn2Own Toronto hacking competition and disclosed…

Top 10 Best Ransomware Protection Tools – 2025

Ransomware is essential to stay vigilant and protect your devices and systems by keeping software up to date, using anti-virus software, avoiding opening attachments or links from unknown sources, and regularly backing up important data. Ransomware is malware that encrypts…

50 World’s Best Penetration Testing Companies – 2025

Penetration testing, or “pentesting,” is a cybersecurity practice where ethical hackers simulate cyberattacks to identify vulnerabilities in systems, networks, or applications. It helps organizations uncover weaknesses before malicious actors exploit them, enhancing their security posture. Penetration testing includes various types…

10 Best Email Security Gateways In 2025

Email is one of the most widely used forms of online communication. It is sent and received through a client program, such as Microsoft Outlook, Gmail, or a web-based interface.  Email is a popular communication technique, but it may not…

Auto-Generated Password Vulnerability In Sitevision Leaks Signing Key

A critical security flaw in Sitevision CMS versions 10.3.1 and older has exposed SAML authentication signing keys, enabling potential authentication bypass and session hijacking. The vulnerability, tracked as CVE-2022-35202, stems from weak auto-generated passwords protecting Java keystores, which could be…

Darcula 3.0 Tool Automatically Generates Phishing Kit For Any Brand

The darcula phishing group has escalated cybercrime capabilities with its newly unveiled “darcula-suite 3.0,” a phishing-as-a-service (PhaaS) platform enabling criminals to automatically generate counterfeit websites for any brand within minutes. This tool represents a paradigm shift in cybercrime efficiency, leveraging…

CISA Releases 7 ICS Advisories Detailing Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) issued seven Industrial Control Systems (ICS) advisories detailing critical vulnerabilities in widely used systems.  These advisories highlight critical vulnerabilities in ICS products from major vendors such ABB, Carrier, Siemens and Mitsubishi Electric, providing…

Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub

A GitHub repository titled Windows-WiFi-Password-Stealer has surfaced, raising concerns among cybersecurity professionals.  This repository, hosted by the user “cyberthirty,” provides a Python-based script capable of extracting saved WiFi credentials from Windows systems and saving them to a text file.  While…

New NailaoLocker Ransomware Attacking European Healthcare

European healthcare organizations are facing a sophisticated cyber threat from a newly identified ransomware strain called NailaoLocker, deployed as part of a campaign tracked as Green Nailao by Orange Cyberdefense CERT. The attacks, first detected between June and October 2024,…

New Zhong Malware Exploit AnyDesk Tool To Attack Fintech & Cryptocurrency

A sophisticated malware campaign leveraging social engineering tactics has targeted financial technology and cryptocurrency platforms between December 20–24, 2024. Dubbed Zhong Stealer, this previously undocumented threat employed compromised AnyDesk installations and phishing lures to infiltrate systems, stealing credentials and establishing…

Multiple NVIDIA CUDA Toolkit Vulnerabilities Let Attackers Trigger DoS

Researchers uncovered nine critical vulnerabilities in NVIDIA’s CUDA Toolkit, a cornerstone software suite for GPU-accelerated computing. These vulnerabilities, spanning the cuobjdump and nvdisasm utilities, expose developers to denial-of-service (DoS) attacks and information disclosure risks when analyzing maliciously crafted cubin files.…

AWS Key Hunter – A Free Automated Tool to Detect Exposed AWS keys

AWS-Key-Hunter is an open-source tool released to automatically scan public GitHub repositories for exposed AWS access keys.  The tool, which leverages continuous monitoring and Discord-based alerts, aims to mitigate risks associated with accidental credential leaks in version control systems. According to the…

Microsoft Admin Technical Guide to Block & Remove Apps on Endpoints

In response to growing regulatory requirements worldwide, Microsoft has published detailed technical guidance for Intune administrators on blocking and removing specific applications from managed endpoints.  The guide focuses on compliance with international frameworks such as Australia’s Protective Security Policy Framework…

Microsoft Power Pages 0-Day Vulnerability Exploited in the Wild

Microsoft has confirmed active exploitation of a critical elevation-of-privilege vulnerability (CVE-2025-24989) in its Power Pages platform, a low-code tool organizations use to build business websites. The vulnerability, which allowed unauthorized attackers to bypass registration controls and escalate network privileges, underscores…

NSA Added New Features to Supercharge Ghidra 11.3

The National Security Agency (NSA) has unveiled Ghidra 11.3, a transformative update to its open-source Software Reverse Engineering (SRE) framework, delivering advanced debugging tools, accelerated emulation, and modernized integrations for cybersecurity professionals.  This version introduces critical enhancements tailored for kernel-level…

Hackers Weaponize Jarsigner App To Execute XLoader Malware

Threat actors have been observed exploiting the legitimate Java Archive (JAR) signing tool jarsigner.exe to deploy the notorious XLoader malware, according to recent findings from the AhnLab Security Intelligence Center (ASEC). This attack leverages DLL side-loading techniques to bypass security…

New Snake Keylogger Attacking Chrome, Edge, and Firefox Users

A sophisticated new variant of the Snake Keylogger (detected as Autolt/Injector.GTY!tr) has emerged as a critical threat to Windows users. It leverages advanced evasion techniques to steal sensitive data from Chrome, Edge, and Firefox browsers. FortiGuard Labs reports over 280…

Lee Enterprises Ransomware Attack Compromises ‘Critical’ Systems

Lee Enterprises, one of the largest newspaper publishers in the U.S., has confirmed a cybersecurity attack involving adversarial encryption of critical business applications and data exfiltration through double-extortion ransomware tactics. The incident has disrupted print distribution, billing systems, and digital…

South Korea Confirm DeepSeek Sending Data Chinese ByteDance Servers

South Korea’s Personal Information Protection Commission (PIPC) announced today that the Chinese AI chatbot DeepSeek transmitted sensitive user data to servers controlled by ByteDance, TikTok’s Beijing-based parent company.  The findings follow a technical audit revealing critical security flaws, including unencrypted…

Most Popular Passwords Cracked Within a Second

Passwords are the first line of defense for protecting sensitive data, yet millions of users worldwide continue to rely on weak and predictable combinations.  A recent study by KnownHost reveals alarming trends in password security. It shows that many commonly…

CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) released two Industrial Control Systems (ICS) advisories, addressing critical vulnerabilities in Delta Electronics CNCSoft-G2 and Rockwell Automation GuardLogix controllers.  These advisories highlight exploitable flaws in systems widely used in manufacturing, energy, and critical…

GPT-4o Copilot Trained in Over 30 Popular Programming Languages

Microsoft has unveiled GPT-4o Copilot, a cutting-edge code completion model now available for Visual Studio Code (VS Code) users.  Built on the GPT-4o mini architecture and trained on over 275,000 high-quality public repositories spanning more than 30 popular programming languages,…

Russian Government Proposed New Penalties to Combat Cybercrime

The Russian government announced a comprehensive legislative package on February 10, 2025, introducing severe penalties for cybercrimes.  The reforms, which amend over 30 existing laws, aim to modernize Russia’s cybersecurity framework by escalating prison terms, expanding asset confiscation protocols, and…

How Cyber Threat Intelligence Helps with Alert Triage

Between threat detection and response, there is a vitally important operation known as alert triage. If not staged properly, it can render the whole SOC’s performance inefficient.   This operation is alert triage — assessing and prioritizing security alerts. SIEM tools,…

OpenSSH Client & Server Vulnerabilities Enables MiTM & DoS Attacks

The Qualys Threat Research Unit (TRU) has uncovered two high-severity vulnerabilities in OpenSSH, the widely used suite for secure network communication. Tracked as CVE-2025-26465 and CVE-2025-26466, these flaws enable machine-in-the-middle (MitM) attacks against clients and pre-authentication denial-of-service (DoS) exploits targeting…

Hackers Hiding Credit Card Stealer Script Within Tag

Cybercriminals have developed a sophisticated method to steal credit card information by embedding malicious scripts within <img> tags on e-commerce websites. This technique, often associated with MageCart attacks, exploits the trustworthiness of image tags to evade detection while targeting platforms…

EagerBee Malware Attacking Government Entities & ISPs To Deploy Backdoor

A sophisticated malware framework dubbed EagerBee is actively targeting government agencies and Internet Service Providers (ISPs). EagerBee is actively targeting these organizations across the Middle East. While the EagerBee was found deploying advanced backdoor capabilities through novel technical implementations. The…