Category: Cyber Security News

Regulatory Compliance – Navigating Cybersecurity Laws

As digital threats escalate and technology rapidly evolves, regulatory compliance has become a defining challenge for organizations worldwide. In 2025, new and updated cybersecurity laws are reshaping how businesses protect data, manage risk, and demonstrate accountability. Navigating this complex legal…

Cybersecurity Skills Gap – Training the Next Generation

The digital revolution has brought unprecedented connectivity and innovation, but it has also unleashed a wave of cyber threats that challenge the very fabric of our interconnected world. As organizations race to defend their data and infrastructure, a critical bottleneck…

CISA Releases ICS Advisories Covering Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released a significant Industrial Control Systems (ICS) advisory targeting a memory leak vulnerability in Johnson Controls’ iSTAR Configuration Utility (ICU) Tool, highlighting ongoing security challenges facing critical infrastructure sectors worldwide.  This latest advisory…

Top Tools for Enterprise Security Monitoring

As cyber threats grow in complexity and frequency, enterprise security monitoring has become a non-negotiable pillar of modern business defense. Data breaches can cost organizations millions, erode customer trust, and have long-term impacts on business performance. Enterprises invest in advanced…

Security Trends Analysis – Emerging Risks for 2025

As the digital landscape continues to evolve at breakneck speed, organizations worldwide are bracing for a new wave of security challenges in 2025. The convergence of artificial intelligence, geopolitical tensions, and quantum computing is reshaping the threat environment, demanding a…

Hackers Mimic OneNote Login to Steal Office365 & Outlook Credentials

A sophisticated phishing campaign targeting Italian and U.S. users through fake Microsoft OneNote login prompts designed to harvest Office 365 and Outlook credentials.  The attack leverages legitimate cloud services and Telegram bots for data exfiltration, making detection significantly more challenging…

Check Point Acquires Veriti for Automated Threat Exposure Management

Check Point Software Technologies has announced the acquisition of Veriti Cybersecurity, marking a significant advancement in automated threat exposure management for enterprises facing increasingly sophisticated AI-driven cyber attacks. The transaction, expected to close by the end of Q2 2025, represents…

GIMP Image Editor Vulnerability Let Remote Attackers Arbitrary Code

Two critical security vulnerabilities discovered in the popular GIMP image editing software have been disclosed. These vulnerabilities allow remote attackers to execute arbitrary code on affected systems.  The vulnerabilities, identified as CVE-2025-2760 and CVE-2025-2761, were publicly disclosed on April 7th,…

Google Ads Campaign Targets Developers with Malware via Fake Homebrew Site

Security researchers have revealed that a sophisticated malvertising campaign discovered last week has been targeting software developers through malicious Google advertisements that impersonate the popular Homebrew package manager. The attack demonstrates an evolution in cybercriminal tactics that exploit trusted verification…

New Attack Bypasses HTTP/2 Security for Arbitrary Cross-Site Scripting

A critical vulnerability in HTTP/2 protocol implementations that allows attackers to bypass web security protections and execute arbitrary cross-site scripting (XSS) attacks against major websites.  At the Network and Distributed System Security (NDSS) Symposium 2025, Tsinghua University researchers presented their…

Weaponized Google Meet Page Tricks Users into Running PowerShell Malware

A sophisticated social engineering campaign that leverages fake Google Meet conference pages to trick users into manually executing malicious PowerShell commands, leading to system compromise through various information-stealing malware, including AsyncRAT, StealC, and Rhadamanthys.  This emerging threat, known as “ClickFix,”…

ChatGPT Deep Research Now Integrates Dropbox & OneDrive to Pull Data

OpenAI has announced a significant expansion of ChatGPT’s deep research capabilities, introducing seamless integration with popular cloud storage platforms including Dropbox and Microsoft OneDrive. This development represents a major step forward in making artificial intelligence more accessible within existing enterprise…

Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges

Two high-severity vulnerabilities (CVE-2025-24916, CVE-2025-24917) in Tenable Network Monitor solution, enabling local privilege escalation on Windows systems through insecure directory permissions and arbitrary code execution.  The security flaws affect all versions prior to 6.5.1 and have been assigned high severity…

Fake DigiYatra Apps Attacking Indian Users to Steal Financial Data

A sophisticated phishing campaign targeting Indian air travelers has emerged, exploiting the trusted DigiYatra brand to harvest sensitive personal and financial information from unsuspecting users. The malicious operation centers around a deceptive website at digiyatra[.]in that masquerades as the official…

Linux 6.15 Released with Several New Features & Improvements

Linus Torvalds officially announced the stable release of the Linux kernel 6.15 on May 25, 2025. This release marked a significant milestone in open-source development, with groundbreaking Rust integration, substantial performance improvements, and extensive hardware support expansion.  This release introduces…

Russian Cybercriminal Charged in $24 Million Qakbot Ransomware Scheme

The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov, 48, for allegedly orchestrating one of the world’s most sophisticated malware operations that infected over 700,000 computers globally and facilitated devastating ransomware attacks.  The Moscow-based…

GenAI Assistant DIANNA Uncovering New Obfuscated Malware

The cybersecurity landscape witnessed a significant milestone this February with the emergence of BypassERWDirectSyscallShellcodeLoader, a sophisticated malware specimen that represents the first documented case of large language model-generated malicious code being analyzed by an artificial intelligence security assistant. This groundbreaking…

Hackers Attacking macOS Users With Fake Ledger Apps to Deploy Malware

Cybercriminals are increasingly targeting cryptocurrency users through sophisticated malware campaigns that exploit the trust placed in cold wallet management applications. Since August 2024, threat actors have been distributing malicious clones of Ledger Live, the widely-used application for managing cryptocurrency through…

New Formjacking Malware Attacking E-Commerce Pages to Steal Credit Card Data

Cybersecurity researchers have uncovered a sophisticated new formjacking malware campaign targeting WooCommerce-powered e-commerce websites, representing a significant evolution in credit card skimming attacks. This advanced threat demonstrates unprecedented stealth capabilities, carefully integrating fake payment forms into legitimate checkout processes while…

Researchers Uncovered Infrastructure & TTPs Used by ALCATRAZ Malware

Security researchers have identified a sophisticated malware campaign utilizing the ALCATRAZ obfuscator, an open-source tool originally developed for the game hacking community that has now been weaponized by cybercriminals and advanced persistent threat groups. The malware, dubbed DOUBLELOADER, has been…

2025 Cybersecurity Trends – Key Threats and Solutions

Artificial intelligence, sophisticated ransomware operations, and evolving geopolitical tensions are dramatically reshaping the cybersecurity landscape in 2025. With over 30,000 vulnerabilities disclosed last year, a 17% increase from previous figures, organizations face unprecedented challenges in securing their digital assets. As…

Enterprise Security Solutions – Building a Resilient Defense

In today’s hyper-connected world, enterprise security is no longer a technical afterthought but a boardroom priority. As cyberattacks grow in frequency and sophistication, organizations are under increasing pressure to protect sensitive data, maintain regulatory compliance, and ensure business continuity. The…

TAG-110 Hackers Weaponize Word Templates for Targeted Attacks

A sophisticated cyber-espionage campaign has emerged targeting Tajikistan’s government institutions through weaponized Microsoft Word templates, marking a significant tactical evolution by the Russia-aligned threat group TAG-110. The campaign, which unfolded between January and February 2025, represents a departure from the…

iPhone Phishing Defense – Recognizing and Blocking Attacks

As mobile devices become increasingly central to daily life, cybercriminals are refining their tactics to exploit vulnerabilities in Apple’s iMessage platform. Recent reports reveal a surge in phishing campaigns that bypass Apple’s built-in security measures by manipulating user behavior, underscoring…

Protecting iPhones from Spyware – Tools and Tips

iPhones have become integral to daily life, so their security has never been more critical. While Apple’s iOS is renowned for its robust security architecture, spyware threats are evolving, and no device is entirely immune. Recent incidents, including high-profile cases…

Threat Actors Deliver Winos 4.0 Impersonate as VPN & QQBrowser

A sophisticated malware campaign leveraging fake software installers disguised as popular applications has emerged as a significant threat to cybersecurity infrastructure, with attackers deploying the hard-to-detect Winos 4.0 malware through deceptive VPN and QQBrowser installations. The campaign represents a concerning…

Securing Android in the Enterprise – Policies and Solutions

Recent security vulnerabilities in Google’s Android operating system have highlighted the critical importance of robust enterprise mobile security strategies. Just days ago, on May 11, 2025, security researchers identified multiple vulnerabilities in the Android OS, with the most severe potentially…

Apple XNU kernel Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability in Apple’s XNU kernel has been disclosed. It allows local attackers to escalate privileges and potentially execute arbitrary code with kernel-level access.  The flaw, identified as CVE-2025-31219, represents a significant security risk across multiple Apple operating…

New Blackhat AI Tool Venice.ai Let Attackers Create Malware in Minutes

A new artificial intelligence platform called Venice.ai is raising serious cybersecurity concerns after researchers discovered it can generate functional malware, phishing emails, and sophisticated cyberattack tools with minimal user expertise.  Unlike mainstream AI services such as ChatGPT, Venice.ai deliberately removes…

CISA Alerts on Threat Actors Targeting Commvault’s Azure App to Steal Secrets

CISA issued an urgent advisory, warning organizations about ongoing cyber threat activity targeting Commvault’s software-as-a-service (SaaS) cloud applications hosted in Microsoft Azure environments.  Threat actors have successfully accessed client secrets for Commvault’s Metallic Microsoft 365 backup solution, providing unauthorized access…

Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks

GitLab has released critical security patches addressing 11 vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE) platforms, with several high-risk flaws enabling denial-of-service (DoS) attacks.  The coordinated release of versions 18.0.1, 17.11.3, and 17.10.7 comes as the DevOps…

Threat Actors Hosted ZeroCrumb Malware on GitHub That Steals Browser Cookies

Cybersecurity researchers have identified a new infostealer malware called “ZeroCrumb” that was recently distributed through GitHub repositories. This sophisticated malware specifically targets browser cookies from popular browsers including Chrome, Brave, and Edge, enabling attackers to steal sensitive user authentication data…

Linux kernel SMB 0-Day Vulnerability Uncovered Using ChatGPT

A zero-day vulnerability in the Linux kernel was discovered, utilizing OpenAI’s o3 model. This finding, assigned CVE-2025-37899, marks a significant advancement in AI-assisted vulnerability research. The vulnerability, officially confirmed on May 20, 2025, affects the ksmbd component of the Linux…