Artificial intelligence is fundamentally reshaping the cybersecurity landscape, introducing both unprecedented defensive capabilities and alarming new attack vectors. The rapid evolution of generative AI and large language models (LLMs) has created a technological inflection point where digital identity verification mechanisms-including…
Category: Cyber Security News
State-Sponsored Hacktivism Attacks on The Rise, Rewrites Cyber Threat Landscape
The global cybersecurity landscape is witnessing an alarming paradigm shift as state-sponsored hacktivism attacks have surged dramatically in recent months, blurring the traditional boundaries between politically motivated activism and sophisticated nation-state operations. These hybrid threats combine the ideological zeal of…
15 Billion User Gain Passwordless Access to Microsoft Account Using Passkeys
As the first-ever World Passkey Day replaces the traditional World Password Day, Microsoft joins the FIDO Alliance in celebrating a milestone achievement: over 15 billion online accounts now have access to passwordless authentication through passkeys. This significant shift marks a…
15 PostgreSQL Monitoring Tools – 2025
PostgreSQL monitoring tools are essential for database administrators to ensure the optimal performance, availability, and reliability of PostgreSQL databases. These tools provide real-time insights into performance metrics, such as query execution times, CPU usage, memory consumption, and disk I/O, helping…
CISA Releases ICS Advisories Targeting Vulnerabilities & Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has released two Industrial Control Systems (ICS) advisories today, addressing critical security vulnerabilities that could potentially impact multiple critical infrastructure sectors including healthcare, manufacturing, energy, transportation, and water systems. The advisories, labeled ICSA-25-121-01…
Hackers Abuse IPv6 Stateless Address For AiTM Attack Via Spellbinder Tool
A sophisticated cyber threat has emerged in recent weeks as threat actors have developed a new technique leveraging IPv6 stateless addressing to conduct Adversary-in-the-Middle (AiTM) attacks. The attack relies on a novel tool called “Spellbinder” that manipulates IPv6 neighbor discovery…
7 Malicious PyPI Packages Abuse Gmail’s SMTP Protocol to Execute Malicious Commands
A sophisticated software supply chain attack leveraging Python Package Index (PyPI) repositories to deploy malware using Google’s SMTP infrastructure as a command-and-control mechanism. The campaign involved seven malicious packages – Coffin-Codes-Pro, Coffin-Codes-NET2, Coffin-Codes-NET, Coffin-Codes-2022, Coffin2022, Coffin-Grave, and cfc-bsb – which…
Windows RDP Bug Allows Login With Expired Passwords – Microsoft Confirms No Fix
Microsoft has confirmed that its Remote Desktop Protocol (RDP) allows users to log into Windows machines using passwords that have already been changed or revoked. The company says it has no plans to change this behavior, describing it as an…
Hackers Using New Eye Pyramid Tool to Leverage Python & Deploy Malware
Cybersecurity experts have identified a sophisticated hacking tool called “Eye Pyramid” being actively deployed in malicious campaigns since mid-January 2025. This tool, originally open-sourced on GitHub in 2022, has only recently gained traction among threat actors, leveraging Python to deploy…
New Attack Techniques Using MCP & How It Will be Used to Build Security Tools
A sophisticated new attack technique known as Malicious Command Protocol (MCP) has emerged in recent weeks, raising significant concerns among cybersecurity professionals worldwide. This novel threat leverages previously unexploited vulnerabilities in command and control infrastructures, allowing attackers to establish persistent…
NVIDIA TensorRT-LLM High-Severity Vulnerability Let Attackers Remote Code
NVIDIA has disclosed and patched a high-severity vulnerability in its TensorRT-LLM framework that could allow attackers with local access to execute malicious code, tamper with data, and potentially compromise AI systems. The vulnerability, tracked as CVE-2025-23254, affects all versions of…
CISA Warns of SonicWall SMA100 OS Command Injection Vulnerability Exploited in Wild
CISA has added the SonicWall SMA100 OS Command Injection Vulnerability, tracked as CVE-2023-44221, to its Known Exploited Vulnerabilities (KEV) catalog. According to CISA’s May 1, 2025 advisory, this vulnerability is actively being exploited in the wild, posing a substantial risk…
LummaStealer’s FakeCAPTCHA Steals Browser Credentials Via Weaponized Microsoft Word Files
Cybercriminals have refined their attack methodologies with a sophisticated campaign leveraging LummaStealer malware and deceptive CAPTCHA prompts to harvest sensitive data. This social engineering approach combines psychological manipulation with lightweight payload delivery, enabling threat actors to bypass traditional security controls…
Nebulous Mantis Hackers Actively Deploying RomCom RAT to Attack Organizations Worldwide
Cybersecurity experts have uncovered a sophisticated espionage campaign orchestrated by the threat actor group known as Nebulous Mantis, utilizing an advanced remote access trojan called RomCom to target organizations globally. The campaign employs deceptive spear-phishing tactics coupled with multi-stage malware…
Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses
The Windows security landscape has dramatically evolved in early 2025, marked by increasingly sophisticated attack vectors and Microsoft’s accelerated defensive innovations. February 2025 witnessed a sharp 87% increase in ransomware incidents globally, with 956 reported victims compared to January. As…
AiTM Phishing Kits Bypassing MFA By Intercepting Credentials & Tokens
Adversary-in-the-Middle (AiTM) phishing kits are emerging as sophisticated threats specifically designed to circumvent multi-factor authentication (MFA), once considered an impenetrable defense against account compromises. Tycoon 2FA, first identified in August 2023, represents the latest evolution in this concerning trend, operating…
Harrods Store Hit by Cyber Attack Following Marks & Spencer and Co-op
Harrods, the world-renowned luxury department store in Knightsbridge, has confirmed it was the target of a sophisticated cyberattack, marking it as the third major UK retailer to be hit by cybercrime within a week. The news follows similar incidents reported…
Trellix Unveils New Phishing Simulator to Proactively Identify & Mitigate Phishing Attacks
In a significant advancement for cybersecurity training, Trellix has introduced its new Phishing Simulator, designed to strengthen organizational defenses against one of the most persistent threat vectors in today’s digital landscape. Announced on April 29, 2025, this comprehensive solution enables…
CISA Warns of Apache HTTP Server Escape Vulnerability Exploited in the Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-38475, a critical vulnerability affecting Apache HTTP Server, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability allows attackers to map URLs to unintended filesystem locations, potentially leading to code execution…
Zero Trust Implementation – A CISO’s Essential Resource Guide
Zero Trust implementation is essential in today’s rapidly evolving digital landscape, as traditional perimeter-based security can no longer defend against sophisticated cyber threats. The rise in remote work, cloud adoption, and interconnected systems has expanded the attack surface, making it…