Category: Cyber Security News

New SharePoint Phishing Attacks Using Lick Deceptive Techniques

A sophisticated new wave of phishing attacks is exploiting Microsoft SharePoint’s trusted platform to bypass traditional security measures, representing a significant evolution in cyberthreat tactics. These attacks leverage SharePoint’s inherent legitimacy within corporate environments to deceive users into believing they…

Canva Creators’ Data Exposed Via AI Chatbot Company Database

A significant data breach involving personal information from hundreds of Canva Creators program participants, exposed through an unsecured AI chatbot database operated by a Russian company.  The incident highlights emerging security vulnerabilities in the rapidly expanding artificial intelligence supply chain.…

Sensata Technologies Hit by Ransomware Attack – Operations Impacted

Sensata Technologies, Inc., a prominent industrial technology company based in Attleboro, Massachusetts, has disclosed a significant cybersecurity incident that compromised the personal information of hundreds of individuals.  The external system breach, classified as a hacking incident, occurred on March 28,…

New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine

Cybersecurity researchers have identified a sophisticated new remote access trojan called DuplexSpy RAT that enables attackers to establish comprehensive surveillance and control over Windows systems. This multifunctional malware represents a growing trend in modular, GUI-driven threats that significantly lower the…

New Blitz Malware Attacking Windows Servers to Deploy Monero Miner

A sophisticated new malware campaign has emerged targeting Windows systems through an elaborate social engineering scheme involving backdoored gaming software. The Blitz malware, first identified in late 2024 and evolving through 2025, represents a concerning trend of cybercriminals exploiting gaming…

How to Use SIEM Tools for Real-Time Threat Monitoring

Real-time threat monitoring through Security Information and Event Management (SIEM) tools has become crucial for organizations seeking to defend against sophisticated cyberattacks. Real-time threat detection refers to the ability to identify and respond to cyber threats as they occur, minimizing…

Arkana Ransomware Group Allegedly Claims Breach of Ticketmaster Databases

Arkana Security Group claims to have successfully gained access to Ticketmaster’s database infrastructure and exfiltrated massive volumes of sensitive customer data. The threat actors have reportedly announced their intentions to sell comprehensive datasets containing ticket sales records, payment methodologies, customer…

Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide

A critical zero-day vulnerability discovered in Salesforce‘s default controller has exposed millions of user records across thousands of deployments worldwide.  The security flaw, found in the built-in aura://CsvDataImportResourceFamilyController/ACTION$getCsvAutoMap controller, allowed attackers to extract sensitive user information and document details through…

Beware of Fake AI Business Tools That Hides Ransomware

Cybercriminals are exploiting the growing demand for artificial intelligence solutions by disguising ransomware within legitimate-looking AI business tools, according to recent security research. This emerging threat specifically targets small businesses and entrepreneurs seeking to integrate AI capabilities into their operations,…

Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details

Korean cybersecurity researchers have uncovered a sophisticated malware campaign targeting cryptocurrency users worldwide, with ViperSoftX emerging as a persistent threat that continues to evolve its attack methodologies. First identified by Fortinet in 2020, this malware has demonstrated remarkable longevity and…

Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens

A significant security vulnerability affecting millions of Chrome extension users has been discovered, revealing widespread exposure of sensitive API keys, secrets, and authentication tokens directly embedded in extension code. This critical flaw stems from developers hardcoding credentials into their JavaScript…

BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide

A sophisticated new variant of the BADBOX malware has successfully compromised over one million Android devices across multiple continents, representing one of the most significant mobile security breaches of 2025. This advanced persistent threat demonstrates enhanced evasion capabilities and has…

DCRat Attacking Users In Latin America To Steal Banking Credentials

A sophisticated malware campaign targeting Latin American users has emerged as a significant threat to the region’s banking sector, with cybercriminals deploying the DCRat banking trojan through elaborate phishing schemes designed to steal financial credentials. The malicious operations, which have…

New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack

The cybersecurity landscape faces a growing threat from sophisticated botnet operations targeting Internet of Things (IoT) devices, with recent developments highlighting the vulnerability of connected cameras and smart devices. While specific details about the Eleven11bot malware remain limited in publicly…

WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins

A sophisticated malware campaign targeting WordPress administrators has been discovered, utilizing a deceptive caching plugin to steal login credentials and compromise website security.  Security researchers have identified a malicious plugin disguised as “wp-runtime-cache” that specifically targets users with administrative privileges,…

Play Ransomware Hacked 900 Organizations, CISA Released TTPs & IOCs

Federal authorities have revealed that the notorious Play ransomware group has successfully breached approximately 900 organizations worldwide as of May 2025, marking a dramatic escalation in cybercriminal activity that has prompted an urgent security advisory from multiple government agencies. The…

Top 10 GPT Tools For Hackers, Penetration Testers, & Security Analysts

A recent analysis has identified ten advanced GPT models that are transforming the methodologies employed by hackers, penetration testers, and security analysts in 2025. These models are enhancing the precision and efficiency of security assessments, threat modeling, and vulnerability exploitation, thereby…

New Phishing Attack that Hides Malicious Link from Outlook Users

A sophisticated phishing technique that exploits Microsoft Outlook‘s HTML rendering capabilities to hide malicious links from corporate security systems while maintaining their effectiveness against end users.  The attack leverages conditional HTML statements to display different content depending on whether the…

New Crocodilus Malware That Gain Complete Control of Android Device

A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that grant cybercriminals unprecedented control over infected smartphones. First discovered in March 2025, this malware has rapidly evolved from localized test…

Business Email Compromise Attacks: How To Detect Them Early

Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake login prompt, a cleverly disguised link, and an employee’s credentials are gone. From there, attackers can quietly access inboxes, exfiltrate…

Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign that weaponizes users’ trust in routine internet verification processes to deliver malicious payloads. The scheme exploits familiar “prove you are human” prompts, transforming seemingly innocent website interactions into vectors for malware distribution…

New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials

Cybersecurity researchers have identified a sophisticated new threat targeting the expanding Internet of Things ecosystem. PumaBot, a Go-based Linux botnet, has emerged as a significant concern for organizations operating vulnerable IoT devices, particularly surveillance systems. Unlike conventional malware that conducts…

Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages

A sophisticated supply chain attack has emerged targeting the RubyGems ecosystem, exploiting geopolitical tensions surrounding Vietnam’s recent Telegram ban to steal sensitive developer credentials and communications. The malicious campaign involves two typosquatted Ruby gems designed to impersonate legitimate Fastlane plugins,…

North Face Fashion Brand Warns of Credential Stuffing Attack

The North Face, a prominent outdoor fashion retailer, has issued a comprehensive security notification to customers following the discovery of a credential stuffing attack against its website on April 23, 2025. The incident represents a growing cybersecurity threat where attackers…