A sophisticated global botnet campaign targeting VOIP-enabled routers and devices configured with default credentials. The discovery began when analysts noticed an unusual cluster of malicious IP addresses concentrated in rural New Mexico, leading to the identification of approximately 500 compromised…
Category: Cyber Security News
Web-to-App Funnels: Pros And Cons
In today’s mobile-first world, companies often struggle to bridge the gap between their websites and mobile apps. This is where web-to-app funnels come into play. These funnels are designed to guide users from a web touchpoint (such as an ad…
Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
Microsoft is currently facing an outage that affects the Microsoft 365 Admin Center, preventing administrators from accessing essential management tools. The issue, which emerged prominently on July 24, 2025, has persisted into the following day, marking the second such incident…
10 Best API Monitoring Tools in 2025
API monitoring tools ensure the performance, availability, and reliability of application programming interfaces (APIs) that connect different software systems. These tools continuously track and analyze API requests and responses to detect slow response times, errors, and downtime. By providing real-time…
15 Best Bandwidth Monitoring Tools in 2025
Bandwidth monitoring tools are essential for managing and optimizing network performance. These tools help IT administrators track and analyze network traffic, identify potential bottlenecks, and ensure efficient bandwidth utilization. By providing real-time data on network usage, bandwidth monitoring tools enable…
Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System
A critical security vulnerability has been discovered in Microsoft Copilot Enterprise, allowing unauthorized users to gain root access to its backend container. This vulnerability poses a significant risk, potentially allowing malicious users to manipulate system settings, access sensitive data, and…
Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers
Two critical vulnerabilities in the VMware Guest Authentication Service (VGAuth) component of VMware Tools allow local attackers to escalate privileges from any user account to SYSTEM-level access on Windows virtual machines. The vulnerabilities, tracked as CVE-2025-22230 and CVE-2025-22247, affect VMware…
Multiple Vulnerabilities in Tridium Niagara Framework Let Attacker to Collect Sensitive Data from the Network
Researchers identified 13 critical vulnerabilities in Tridium’s widely-deployed Niagara Framework that could allow attackers to compromise building automation systems and collect sensitive network data. The vulnerabilities, affecting versions 4.10u10 and earlier, as well as 4.14u1 and earlier, enable attackers with…
Beware of Fake Error Pages That Linux and Windows Systems With Platform-Specific Malware
A new wave of cryptojacking attacks is exploiting the humble 404 error page to sneak malicious binaries past defenders Dubbed “Soco404,” the campaign embeds base64-encoded payloads inside seemingly innocuous error screens hosted on Google Sites and compromised Tomcat servers, then…
Top Early‑Stage Cybersecurity Startups To Watch In 2025
Digital threats are evolving at an ever-increasing rate, and a new breed of cybersecurity companies is emerging into the limelight as a result. These innovative and dynamic teams are addressing a wide range of issues, including cloud-native vulnerabilities and AI-powered…
Staying Ahead Of The Curve With A Temporary Email Address
The world is changing so quickly. Just when you thought you had heard it all, something as genius as a temporary email address came out of the fold. Oh, wait, you haven’t heard of this? Well, then you’re in luck…
How AI Is Redefining Threat Detection In The Cloud Era
Every second, AWS processes 1.2 billion API calls. Each one triggers a security check. That’s not just impressive it’s the backbone of what might be the world’s largest security operation. While we’re debating whether AI will change cybersecurity, AWS has…
Strengthening Security Measures In Digital Advertising Platforms
Data breaches pose significant threats to digital advertising platforms, jeopardizing user privacy and trust. Implementing robust security measures within display ad servers is crucial to safeguard sensitive information. Transparent practices, encryption, and routine audits are vital to maintaining data integrity…
New Phishing Attack Mimics Facebook Login Page to Steal Credentials
A rapidly evolving campaign is using a Browser-in-the-Browser (BitB) overlay to impersonate Facebook’s login and siphon user credentials. The lure hinges on a deceptive CAPTCHA challenge that seamlessly morphs into a counterfeit Facebook session window, duping victims across desktops and…
Bulletproof Hosting Provider Aeza Group Shifting Their Infrastructure to New Autonomous System
Following U.S. Treasury sanctions imposed on July 1, 2025, the notorious bulletproof hosting provider Aeza Group has rapidly migrated its infrastructure to a new autonomous system in an apparent attempt to evade enforcement measures. Cybersecurity researchers at Silent Push detected…
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
Google Forms, praised for friction-free data collection, has become the unlikely staging ground for rapidly spreading crypto-phishing campaign. First detected in late-2024 but surging in Q2 2025, the ploy begins with an unsolicited email containing a legitimate‐looking forms.gle link that…
Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials
Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes…
New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer
A newly uncovered campaign is exploiting gamers’ enthusiasm for off-beat indie titles to plant credential-stealing malware on machines. Branded installers for nonexistent games such as “Baruda Quest,” “Warstorm Fire,” and “Dire Talon” are pushed through slick YouTube trailers and Discord…
Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter to Infiltrate Organizations
A sophisticated espionage campaign dubbed “Fire Ant” demonstrates previously unknown capabilities in compromising VMware virtualization infrastructure. Since early 2025, this threat actor has systematically targeted VMware ESXi hosts, vCenter servers, and network appliances using hypervisor-level techniques that evade traditional endpoint…
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT
A sophisticated Russian-aligned threat actor known as Hive0156 has intensified its cyber espionage campaigns against Ukrainian government and military organizations, deploying the notorious Remcos Remote Access Trojan through carefully crafted social engineering attacks. The group has demonstrated remarkable persistence in…