Attackers have successfully infiltrated n8n’s community node ecosystem using a malicious npm package disguised as a legitimate Google Ads integration tool. The attack reveals a critical vulnerability in how workflow automation platforms handle third-party integrations and user credentials. The malicious…
Category: Cyber Security News
Google Integrating Gemini With Gmail With New features
Google announced Monday it’s integrating its Gemini AI model into Gmail, introducing features that transform the email service into a proactive personal assistant for its 3 billion users. The company is launching AI Overviews, a feature that synthesizes long email threads…
YARA-X 1.11.0 Released With a New Hash Function Warnings
VirusTotal has released YARA-X version 1.11.0, introducing an important new feature designed to improve rule reliability and reduce false negatives in malware detection. The latest update introduces hash-function warnings that help security researchers catch common mistakes when writing YARA detection rules.…
InvisibleJS Tool Hides Executable ES Modules in Empty Files Using Zero-Width Steganography
InvisibleJS, a new open-source tool that conceals JavaScript code using invisible zero-width Unicode characters, raises alarms about potential misuse in malware campaigns. InvisibleJS, hosted on GitHub by developer With alias oscarmine, employs steganography to embed source code into seemingly blank…
10 Best Network Security Providers for Healthcare Industry in 2026
The surge in Electronic Health Records (EHRs), telemedicine, and interconnected medical devices has forged a intricate healthcare ecosystem ripe for cyber exploitation. Robust network security solutions are non-negotiable to shield sensitive patient data from advanced threats. Healthcare-focused providers deliver multi-layered…
India Continues to Be the Top Target for Mobile Attacks with 38% Increase in Threats
India faces an unprecedented surge in mobile malware attacks, with a staggering 38% increase in threats compared to the previous year, according to the latest findings from the Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report. The country has…
Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software
The cybersecurity landscape is experiencing a major shift in how attackers operate. Threat actors have moved away from traditional hunting methods like phishing emails and cold outreach. Instead, they are now creating sophisticated traps designed to make high-value targets walk…
Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data
A critical XML external entity (XXE) injection vulnerability has been discovered in Apache Struts 2, potentially exposing millions of applications to data theft and server compromise. The vulnerability, tracked as CVE-2025-68493, affects multiple versions of the widely used framework and requires…
Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files
Threat actor HawkSec claims to be auctioning a Discord dataset comprising 78,541,207 files. The collection, organized into messages, voice sessions, actions, and servers, stems from an abandoned OSINT/CSINT project spanning several months. HawkSec promoted the dataset in their Discord server,…
Critical React Router Vulnerability Let Attackers Access or Modify Server Files
Security researchers have identified critical vulnerabilities in React Router that allow attackers to access or modify server files via directory traversal. The flaws affect multiple packages within the React Router ecosystem and carry a CVSS v3 score of 9.8, classifying…
Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following Nation‑State Sanctions Evasion Moves
The cryptocurrency crime landscape reached an unprecedented milestone in 2025, with illicit cryptocurrency addresses receiving at least 154 billion dollars. This staggering figure represents a 162 percent increase compared to the previous year, driven largely by nation-states moving into cryptocurrency…
Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware
Cybersecurity threats continue to evolve with attackers using more creative social engineering techniques to target organizations. A recent threat has emerged involving the Guloader malware, which is being disguised as employee performance reports to trick users into downloading and executing…
ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details
A new wave of attacks is using the ValleyRAT_S2 malware to quietly break into organizations, stay hidden for long periods, and steal sensitive financial information. ValleyRAT_S2 is the second-stage payload of the ValleyRAT family and is written in C++. Once…
X Suspended Twitter Account for Violation of Rules
X has suspended the iconic @twitter handle on its platform, replacing its profile with a standard notice stating the account violates rules. Screenshots of the suspension screen began circulating widely late last week, igniting discussions about the platform’s rebranding efforts.…
Critical Zlib Vulnerability Let Attackers Trigger Buffer Overflow by Invoking untgz
A severe global buffer overflow vulnerability has been discovered in the zlib untgz utility version 1.3.1.2. Allowing attackers to corrupt memory and potentially execute malicious code through specially crafted command-line input. The security flaw resides in the TGZfname() function of…
Everest Hacking Group Allegedly Claims Breach of Nissan Motors
Everest hacking group has allegedly claimed a major breach of Nissan Motor Co., Ltd., raising fresh concerns about data security at large automotive manufacturers. According to early reports, the cybercrime group says it exfiltrated around 900 GB of sensitive data…
Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service
Critical vulnerabilities in InputPlumber, a Linux input device utility used in SteamOS, could allow attackers to inject UI inputs and cause denial-of-service conditions on affected systems. The SUSE researchers tracked as CVE-2025-66005 and CVE-2025-14338, which affect InputPlumber versions before v0.69.0 and stem from…
New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets
A recent investigation has exposed the technical foundation of underground carding operations, revealing 28 unique IP addresses and 85 domains actively hosting illegal marketplaces where stolen credit card data is bought and sold. These platforms operate as sophisticated e-commerce sites…
New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits
The world of cybercrime has taken a dangerous turn as pig butchering scams now operate as turnkey services, lowering entry barriers for bad actors worldwide. The “Penguin” operation represents a growing marketplace that provides everything scammers need to launch large-scale…
New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender
Security researcher TwoSevenOneT, known for EDR evasion tools like EDR-Freeze and EDR-Redir, unveiled EDRStartupHinder this week. The tool blocks antivirus and EDR services at startup by redirecting critical System32 DLLs via Windows Bindlink, demonstrated on Windows Defender in Windows 11…