Tag: Cyber Security News

INE Security Unveiled Enhanced eMAPT Certification

Cary, North Carolina, July 10th, 2025, CyberNewsWire Industry’s Most Comprehensive Mobile Application Penetration Testing Program Addresses Real-World Mobile Security Challenges. INE Security, a leading provider of cybersecurity education and cybersecurity certifications, today launched its significantly enhanced eMAPT (Mobile Application Penetration Testing)…

Hackers Abused GitHub to Spread Malware Mimic as VPN

A sophisticated malware campaign has emerged exploiting the trusted GitHub platform to distribute malicious software disguised as legitimate tools. Threat actors have successfully weaponized the popular code repository to host and distribute the notorious Lumma Stealer malware, masquerading it as…

ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data

A significant vulnerability in ServiceNow’s platform, designated CVE-2025-3648 and dubbed “Count(er) Strike,” enables attackers to exfiltrate sensitive data, including PII, credentials, and financial information.  This high-severity vulnerability exploits the record count UI element on list pages through enumeration techniques and…

New PerfektBlue Attack Exposes Millions of Cars to Remote Hacking

A new and critical security threat, PerfektBlue, has emerged, targeting OpenSynergy’s BlueSDK Bluetooth framework and posing an unprecedented risk to the automotive industry. This sophisticated attack vector enables remote code execution (RCE) on millions of devices across automotive and other…

Ransomware Operations Surge Following Qilin’s New Pattern of Attacks

The cybersecurity landscape witnessed a dramatic shift in June 2025 as the Qilin ransomware group emerged as the dominant threat actor, orchestrating an unprecedented surge in high-value targeted attacks across multiple sectors and geographical regions. This escalation represents a fundamental…

Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner

A critical remote code execution vulnerability in GeoServer has become a prime target for cybercriminals deploying cryptocurrency mining malware across global networks. The vulnerability, designated CVE-2024-36401, affects the popular open-source Geographic Information System server written in Java, which provides essential…

GitPhish – A New Tool that Automates GitHub Device Code Phishing Attack

GitPhish represents a significant advancement in automated social engineering tools, specifically targeting GitHub’s OAuth 2.0 Device Authorization Grant implementation.  This open-source tool streamlines the traditionally complex process of executing device code phishing attacks, addressing critical operational challenges faced by security…

Best SOC 2 Type 2 Certified Complaint Solutions – 2025

In today’s digital-first business landscape, SOC 2 Type 2 compliance is no longer optional for organizations handling sensitive customer data. As cyber threats escalate and regulatory scrutiny intensifies, demonstrating robust security controls and continuous monitoring is essential for trust, growth,…

Microsoft Outlook Down: Users Unable to Access Mailboxes

In a significant disruption for millions of users worldwide, Microsoft Outlook has been experiencing a major outage since Wednesday, July 9, 2025, starting at 10:20 PM UTC. The issue has left users unable to access their mailboxes through any connection…

Reflectiz Now Available on the Datadog Marketplace

Reflectiz, a leading cybersecurity company specializing in web exposure management, today announced a new integration with Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications. This integration combines advanced website security intelligence with enterprise-grade observability, empowering organizations with…

Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data

A critical Local File Inclusion (LFI) vulnerability was recently discovered in Microsoft 365’s Export to PDF functionality, potentially allowing attackers to access sensitive server-side data, including configuration files, database credentials, and application source code.  The vulnerability, reported by security researcher…

Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server

Microsoft has released critical security updates to address CVE-2025-47981, a severe heap-based buffer overflow vulnerability in the SPNEGO Extended Negotiation (NEGOEX) Security Mechanism that affects multiple Windows and Windows Server versions.  This vulnerability carries a CVSS score of 9.8 out…

Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks

Apache Tomcat has addressed three critical denial-of-service (DoS) vulnerabilities that could allow malicious actors to disrupt web applications and services.  These security flaws, tracked as CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506, affect all Apache Tomcat versions from 9.0.0.M1 to 9.0.106.  The vulnerabilities…

10 Best Secure Web Gateway Vendors In 2025

In 2025, the need for robust secure web gateways (SWGs) has never been greater. As organizations shift to hybrid work, cloud-first strategies, and digital transformation, threats targeting web traffic have grown in sophistication. Secure web gateways are now a foundational…

Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network

A critical information disclosure vulnerability in Microsoft SQL Server, designated as CVE-2025-49719, allows unauthorized attackers to access sensitive data over network connections.  This vulnerability stems from improper input validation within SQL Server’s processing mechanisms, enabling attackers to disclose uninitialized memory…

10 Best Advanced Endpoint Security Tools – 2025

10 Best Advanced Endpoint Security Tools – 2024 Introduction In today’s digital-first business landscape, advanced endpoint security is not just a luxury—it’s a necessity. As organizations expand their operations across cloud, remote, and hybrid environments, every endpoint becomes a potential…

Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks

Recently, two vulnerabilities have been discovered in specific Zoom Clients for Windows, which could enable attackers to launch Denial of Service (DoS) attacks. These flaws, tracked under CVE-2025-49464 and CVE-2025-46789, were reported by security researcher fre3dm4n and carry a Medium…

25 Best Managed Security Service Providers (MSSP) In 2025

Managed Security Service Providers (MSSPs) are specialized companies that deliver outsourced cybersecurity services to protect businesses from evolving cyber threats. These providers offer a range of services, including 24/7 threat monitoring, incident response, vulnerability management, and compliance support. MSSPs help…

Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators

Scattered Spider’s phishing domain patterns provide actionable insights to proactively counter threats from the notorious cyber group responsible for recent airline attacks. Scattered Spider, a sophisticated cyber threat group known for aggressive social engineering and targeted phishing, is broadening its…

10 Best ZTNA Solutions (Zero Trust Network Access) In 2025

Zero Trust Network Access (ZTNA) has become a cornerstone of modern cybersecurity strategies, especially as organizations embrace remote work, cloud adoption, and hybrid infrastructures. In 2025, ZTNA solutions are not just a trend they are a necessity for securing sensitive…

IT Gain Ingram Micro Internal Systems Hit by Ransomware Attack

Global technology distributor Ingram Micro has confirmed that its internal systems have been compromised by ransomware, leading to significant operational disruptions across its worldwide IT ecosystem operations.  The Irvine, California-based company, which serves nearly 90% of the global population through…

Parrot OS 6.4 Released With Update For Popular Penetration Testing Tools

Debian-based penetration testing distribution delivers enhanced tools and prepares for next-generation release. Parrot Security has announced the release of Parrot OS 6.4, marking a significant milestone for the Debian-based penetration testing and cybersecurity distribution. This latest version brings substantial updates…

New Slopsquatting Attack Leverage Coding Agents Workflows to Deliver Malware

Researchers have identified a sophisticated new supply-chain threat targeting AI-powered development workflows, where malicious actors exploit coding agents‘ tendency to “hallucinate” non-existent package names to distribute malware. This emerging attack vector, dubbed “slopsquatting,” represents an evolution of traditional typosquatting that…

NordDragonScan Attacking Windows Users to Steal Login Credentials

Security researchers have uncovered a new high-severity cyberattack campaign targeting Microsoft Windows users through a sophisticated infostealer malware called “NordDragonScan.” The malware employs advanced techniques to steal login credentials, browser data, and sensitive documents from compromised systems. Advanced Delivery Method…

Top 10 Security Service Edge (SSE) Solutions For Network Security – 2025

In 2025, Security Service Edge (SSE) solutions have become essential for organizations aiming to secure their rapidly evolving networks. As businesses embrace hybrid work, cloud-first strategies, and global digital operations, the demand for robust, cloud-delivered security has surged. SSE platforms…

RingReaper – New Linux EDR Evasion Tool Using io_uring Kernel Feature

A sophisticated new Linux evasion tool called RingReaper has emerged, leveraging the legitimate io_uring kernel feature to bypass modern Endpoint Detection and Response (EDR) systems.  This advanced red team tool demonstrates how attackers can exploit high-performance asynchronous I/O operations to…

10 Best Vulnerability Management Tools In 2025

In today’s rapidly evolving digital landscape, vulnerability management has become a cornerstone of effective cybersecurity. As organizations expand their digital footprint across cloud, on-premises, and hybrid environments, the need for robust vulnerability management tools is more critical than ever. These…

10 Best Secure Network As A Service For MSP Providers – 2025

In 2025, Managed Service Providers (MSPs) face unprecedented demands for secure, scalable, and flexible network solutions. As businesses accelerate digital transformation, the need for Network as a Service (NaaS) cloud-based, on-demand networking has surged. MSPs must deliver robust, secure connectivity…

ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access

Two critical vulnerabilities in ScriptCase’s Production Environment module can be chained together to achieve pre-authenticated remote command execution on affected servers.  The vulnerabilities, tracked as CVE-2025-47227 and CVE-2025-47228, affect version 1.0.003-build-2 of the Production Environment module included in ScriptCase version…

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Cybersecurity researchers have discovered a sophisticated attack technique that exploits Microsoft Azure Arc deployments to gain persistent access to enterprise environments. The research, conducted during recent red team operations, reveals how adversaries can leverage misconfigured Azure Arc installations to escalate…

Microsoft Investigating Forms Service Issue Not Accessible for Users

Microsoft is currently investigating a significant service disruption affecting Microsoft Forms, leaving numerous users unable to access the popular online survey and quiz platform. The issue, identified as incident FM1109073, began on July 4, 2025, at 12:42 PM GMT+5:30 and…