Tag: Cyber Security News

Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration

Cybercriminals are increasingly leveraging DNS (Domain Name System) tunneling to establish covert communication channels that bypass traditional network security measures.  This sophisticated technique exploits the fundamental trust placed in DNS traffic, which typically passes through corporate firewalls with minimal inspection…

GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability

A highly sophisticated malware campaign targeting Microsoft Exchange servers in government and high-tech organizations across Asia.  The malware, dubbed GhostContainer, exploits known N-day vulnerabilities to establish persistent backdoor access to critical infrastructure. Key Takeaways1. GhostContainer uses CVE-2020-0688 vulnerability to create…

Microsoft Congratulates MSRC’s Most Valuable Security Researchers

Microsoft has officially announced its 2025 Most Valuable Security Researchers, recognizing the top 100 security researchers worldwide who have made significant contributions to protecting Microsoft customers through the Microsoft Security Response Center (MSRC) program.  The recognition is based on a…

Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript

Threat actors are quietly turning Scalable Vector Graphics (SVG) files into precision-guided malware. In a surge of phishing campaigns, seemingly innocuous .svg attachments slip past secure email gateways because mail filters regard them as static images. Once the recipient merely…

BaitTrap – 17,000+ Fake News Websites Caught Promoting Investment Frauds

A massive network of fraudulent news websites has been uncovered, with cybersecurity researchers identifying over 17,000 Baiting News Sites (BNS) across 50 countries orchestrating sophisticated investment fraud schemes. These malicious platforms masquerade as legitimate news outlets, publishing fabricated stories featuring…

Google Chrome 0-day Vulnerability Actively Exploited in the Wild

Google has released an emergency security update for Chrome, addressing a critical zero-day vulnerability that attackers are actively exploiting in real-world attacks. The tech giant confirmed that CVE-2025-6558 is being leveraged by threat actors, prompting an immediate patch deployment across…

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data

The cybersecurity landscape has witnessed an alarming evolution in hacktivist operations, with threat actors increasingly shifting their focus from traditional DDoS attacks and website defacements to sophisticated industrial control system (ICS) infiltrations. This tactical transformation represents a significant escalation in…

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups

North Korean threat actors have escalated their sophisticated cyber operations against cryptocurrency startups, deploying an evolved malware campaign that leverages fraudulent Zoom meeting invitations to infiltrate target organizations. The campaign, which has been active for over a year, specifically targets…

Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems

The cybersecurity landscape has experienced a dramatic shift as ransomware operators increasingly target Linux and VMware environments, abandoning their traditional focus on Windows systems. Recent threat intelligence indicates that criminal groups are developing sophisticated, Linux-native ransomware specifically engineered to exploit…

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack

A newly disclosed flaw in Apache Tomcat’s Coyote engine—tracked as CVE-2025-53506—has surfaced in the latest round of HTTP/2 security advisories. First noted in the National Vulnerability Database five days ago, the weakness stems from Coyote’s failure to enforce a hard…

How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment

Security Operations Centers (SOCs) face a fundamental challenge: distinguishing genuine threats from false positives while maintaining rapid response times. The key to meeting this challenge lies in enriching threat data with actionable context that enables faster, more informed decision-making.  Core…

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Cybersecurity researchers have identified a sophisticated international fraud campaign that leverages impersonated news websites from major outlets including CNN, BBC, CNBC, News24, and ABC News to orchestrate large-scale investment scams. The operation demonstrates advanced social engineering tactics combined with technical…

GLOBAL GROUP RaaS Operators Enable AI-powered Negotiation Functionality

A sophisticated new ransomware-as-a-service operation has emerged with advanced AI-powered negotiation capabilities and mobile management features, targeting organizations across healthcare, automotive, and industrial sectors. GLOBAL GROUP, operated by threat actor “$$$”, has claimed 17 victims across multiple countries since its…

MITRE Launches AADAPT Framework for Detecting and Responding to Digital Asset Management Attacks

Key Takeaways1. MITRE launched AADAPT™, a specialized security framework for blockchain and cryptocurrency threats, modeled after ATT&CK.2. Features 11 tactical categories with 38 techniques covering blockchain-specific attacks from reconnaissance to impact.3. Addresses digital asset-specific vulnerabilities like Flash Loans, Smart Contract…

CBI Busts Noida Based Tech Support Scam Targeting UK & Australian Citizens

The Central Bureau of Investigation (CBI) has successfully dismantled a sophisticated transnational cybercrime syndicate operating from Noida’s Special Economic Zone, targeting citizens across the United Kingdom and Australia through elaborate tech support scams. The operation, conducted on July 7, 2025,…

20-Year-Old Vulnerability Allows Hackers to Control Train Brakes

CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to control train brakes remotely.  The vulnerability, assigned CVE-2025-1727, affects End-of-Train and Head-of-Train remote linking protocols used across the United States…

Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials

A new wave of phishing emails promising a “Social Media Manager” position at Red Bull has surfaced in corporate and personal inboxes worldwide. Disguised as personalized invitations, the messages originate from messaging-service@post.xero.com and sail through SPF, DKIM and DMARC checks,…

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

A Pune-based automobile parts manufacturer fell victim to a sophisticated man-in-the-middle (MITM) cyber attack, resulting in a loss of ₹2.35 crore.  The 52-year-old director of the company filed an FIR with the cybercrime police station after discovering that fraudsters impersonating…

Louis Vuitton Hacked – Attackers Stolen Customers Personal Data

Key Takeaways 1. Louis Vuitton confirmed a July 2 data breach affecting UK customers, the third LVMH attack in three months.2. Customer names, contact details, and purchase histories were stolen, but no financial data was compromised.3. The company notified authorities,…

10 Best Cloud VPN Providers – 2025

Cloud VPNs have become essential for both businesses and individuals seeking secure, private, and reliable internet access in 2025. As cyber threats evolve and remote work becomes the norm, choosing the right cloud VPN provider is crucial for safeguarding sensitive…

11 Best Cloud Access Security Broker Software (CASB) – 2025

As organizations accelerate digital transformation, the need for robust cloud security has never been greater. Cloud Access Security Broker (CASB) software stands at the forefront, acting as the critical gatekeeper between users and cloud service providers. With the explosion of…

Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack

Grok-4 has been jailbroken using a new strategy that combines two different jailbreak methods to bypass artificial intelligence security measures. This raises concerns over the vulnerability of large language models (LLMs) to sophisticated adversarial attacks. Key Takeaways1. Researchers merged Echo…

Top 11 Passwordless Authentication Tools – 2025

In 2025, passwordless authentication tools are transforming digital security by eliminating the need for traditional passwords and introducing advanced, user-friendly authentication methods. With cyber threats on the rise and user experience at the forefront, organizations are rapidly adopting these solutions…

Top 10 Cyber Attack Maps to See Digital Threats In 2025

In 2025, the digital threat landscape is more dynamic and complex than ever. Cyber attacks are escalating in frequency, sophistication, and impact, targeting businesses, governments, and individuals worldwide. Real-time visibility into these threats is essential for proactive defense, strategic planning,…

GPUHammer – First Rowhammer Attack Targeting NVIDIA GPUs

Cybersecurity researchers at the University of Toronto have achieved a breakthrough in hardware-level attacks by successfully demonstrating GPUHammer, the first Rowhammer attack specifically targeting discrete NVIDIA GPUs. The research, which focuses on the popular NVIDIA A6000 GPU with GDDR6 memory,…

WordPress GravityForms Plugin Hacked to Include Malicious Code

A sophisticated supply chain attack has compromised the official GravityForms WordPress plugin, allowing attackers to inject malicious code that enables remote code execution on affected websites. The attack, discovered on July 11, 2025, represents a significant security breach affecting one…

OpenAI is to Launch a AI Web Browser in Coming Weeks

OpenAI is reportedly preparing to release an artificial intelligence-enhanced web browser within the coming weeks, marking the company’s latest expansion beyond its popular ChatGPT platform. The new browser will feature integrated AI agent capabilities designed to autonomously handle various online…

Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability

Trendyol’s application security team uncovered a series of bypasses that render Meta’s Llama Firewall protections unreliable against sophisticated prompt injection attacks. The findings raise fresh concerns about the readiness of existing LLM security measures and underscore the urgent need for…

Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security

Microsoft has successfully eliminated high-privilege access vulnerabilities across its Microsoft 365 ecosystem as part of its comprehensive Secure Future Initiative, marking a significant milestone in enterprise security architecture. The technology giant’s Deputy Chief Information Security Officer for Experiences and Devices,…

Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data

The cybersecurity landscape is witnessing an alarming surge in macOS-targeted information-stealing malware, marking a significant shift from the traditional Windows-centric threat model. These sophisticated infostealers are rapidly evolving to exploit macOS environments with unprecedented precision, targeting valuable data including browser…

CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding a critical vulnerability in Citrix NetScaler ADC and Gateway products that is being actively exploited in cyberattacks.  The vulnerability, tracked as CVE-2025-5777, has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog with…

CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released thirteen critical Industrial Control Systems (ICS) advisories on July 10, 2025, highlighting significant vulnerabilities affecting major industrial automation vendors. This comprehensive security alert encompasses multiple attack vectors targeting essential infrastructure components,…

IT Giant Ingram Micro Restores Operations Following Ransomware Attack

In a significant cybersecurity incident that underscored the persistent threat of ransomware attacks on global IT infrastructure, Ingram Micro Holding Corporation successfully restored its business operations after a four-day battle against malicious actors who infiltrated its internal systems. The attack,…

Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code

A critical security vulnerability in Fortinet’s FortiWeb Fabric Connector has been discovered and exploited, allowing attackers to execute remote code on affected systems without authentication. The vulnerability, designated CVE-2025-25257, represents a significant threat to organizations using Fortinet’s web application firewall…

Apache HTTP Server 2.4.64 Released With Patch for 8 Vulnerabilities

The Apache Software Foundation has released Apache HTTP Server version 2.4.64, addressing eight critical security vulnerabilities that affected versions spanning from 2.4.0 through 2.4.63.  This latest update resolves a range of issues, including HTTP response splitting, server-side request forgery (SSRF),…

AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets

Advanced Micro Devices has disclosed a series of critical security vulnerabilities affecting multiple generations of its processor architectures, stemming from transient scheduler attacks that exploit speculative execution mechanisms. The vulnerabilities, identified through four distinct Common Vulnerabilities and Exposures (CVE) entries,…

Top 11 Best SysAdmin Tools in 2025

In today’s rapidly evolving IT landscape, system administrators (SysAdmins) are the backbone of organizational efficiency and security. The right tools not only streamline workflows but also ensure robust monitoring, automation, and troubleshooting. As infrastructures become increasingly hybrid and complex, the…

Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild

Researchers have observed widespread exploitation attempts targeting a critical memory disclosure vulnerability in Citrix NetScaler devices, designated as CVE-2025-5777 and dubbed “CitrixBleed 2.”  This pre-authentication flaw enables attackers to craft malicious requests that leak uninitialized memory from affected NetScaler ADC…

10 Best Digital Forensic Investigation Tools – 2025

In today’s digital-first world, cybercrime is evolving rapidly, making digital forensic investigation tools indispensable for law enforcement, cybersecurity professionals, and corporate investigators. These tools empower experts to uncover, analyze, and present digital evidence from computers, mobile devices, cloud services, and…

Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension

A sophisticated cybercrime operation has successfully stolen $500,000 in cryptocurrency assets from a Russian blockchain developer through a malicious extension targeting the Cursor AI integrated development environment. The attack, which occurred in June 2025, represents a concerning evolution in supply…