Native apps are built compatible with a platform or operating system, such as iOS or Android. While unrestricted access to all device functionalities (camera, GPS, and push notifications) makes native apps attractive for users, it also poses significant risks. Cyber…
Tag: Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
A sophisticated supply chain attack targeting the popular npm package ‘rand-user-agent’ was discovered on May 5, 2025. The compromise affects a legitimate JavaScript library used to generate randomized user-agent strings for web scraping operations, inserting malicious code that establishes remote…
Threat Actors Using Multimedia Systems Via Stealthy Vishing Attack
Cybercriminals have developed sophisticated vishing techniques that leverage multimedia file formats to bypass security systems and target unsuspecting victims. These new attack vectors, observed in early 2025, represent an evolution in social engineering tactics where threat actors exploit commonly trusted…
Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services
Cybersecurity experts have identified an escalating campaign by the notorious hacker collective Scattered Spider, which continues to evolve its sophisticated attack methods in 2025. The group, active since at least 2022, has shifted focus to target business services including Klaviyo,…
LockBit Hacked – 20 Critical CVEs Exploited by LockBit Uncovered
The notorious LockBit ransomware gang website has been hacked. On May 7, 2025, the group’s dark web affiliate panels were defaced with the message “Don’t do crime CRIME IS BAD xoxo from Prague,” accompanied by a link to a MySQL database…
Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems
A sophisticated multilayered email attack campaign has emerged, utilizing weaponized PDF invoices as the initial vector to deliver remote access trojan (RAT) malware across multiple platforms. The attack primarily targets Windows systems but can also affect Linux and macOS devices…
Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network
Threat actors increasingly leverage Windows Remote Management (WinRM) to move stealthily within Active Directory (AD) environments, evading traditional detection mechanisms while escalating privileges and deploying malicious payloads. WinRM, Microsoft’s implementation of the WS-Management protocol, is a core component of Windows…
Critical Azure & Power Apps Vulnerabilities Let Attackers Escalate Privileges
Microsoft has patched four critical security vulnerabilities affecting several core cloud services including Azure DevOps, Azure Automation, Azure Storage, and Microsoft Power Apps. These high-severity flaws, disclosed on May 9, 2025, could potentially allow attackers to escalate privileges and compromise…
25 Best Cloud Service Providers (Public and Private) in 2025
As technology advances, more and more organizations are turning to cloud computing as a necessary solution for their data storage and processing needs. Cloud computing is a widely accepted trend in the information technology industry, and it allows users to…
FBI Warns of Hackers Compromising End-of-Life Routers to Hide Their Activity
The Federal Bureau of Investigation has issued an urgent public service announcement warning that cybercriminals are actively exploiting outdated routers to build extensive proxy networks for illicit activities. According to a recent FBI FLASH report, threat actors are targeting end-of-life…
Indirect Prompt Injection Leverage LLMs as They Lack Informational Context
Cybersecurity researchers have identified a growing threat vector targeting artificial intelligence systems through a technique known as indirect prompt injection. Unlike traditional attacks that directly manipulate an LLM’s user interface, these sophisticated attacks embed malicious instructions within external content that…
FreeDrain Phishing Attack Users to Steal Users Financial Login Credentials
A sprawling phishing operation dubbed “FreeDrain” has emerged as an industrial-scale cryptocurrency theft network that systematically targets and drains digital wallets. This sophisticated campaign leverages search engine manipulation and free-tier web hosting services to create an extensive web of malicious…
Hackers Attacking Windows IIS Web Server With Native Module Malware
A sophisticated attack campaign targeting Windows IIS web servers with stealthy malicious native modules. Researchers observed Chinese-speaking threat actors deploying advanced IIS malware against South Korean web servers, allowing attackers to intercept and manipulate all incoming web traffic while remaining…
Azure Storage Utility Vulnerability Let Attackers Escalate Their Privileges to Root
A critical security vulnerability in AZNFS-mount, an Azure utility that allows attackers to escalate privileges from an unprivileged user to root on Linux machines. The vulnerability affects all versions up to 2.0.10 of the utility, which comes preinstalled on Azure…
North Korean’s OtterCookie Malware Upgraded With New Features for Windows, Linux & macOS
A sophisticated malware known as OtterCookie, attributed to the North Korean threat actor WaterPlum (also called Famous Chollima or PurpleBravo), has received significant upgrades that enhance its cross-platform capabilities and credential theft functions. First observed in September 2024, this malware…
The Rise of Ransomware – Strategies to Protect Your Systems
Ransomware has emerged as one of the digital age’s most pervasive and financially devastating cyber threats. In 2024, organizations globally faced unprecedented challenges, with 59% reporting ransomware attacks in the past year, a 13% increase over five years. The average…
New Spam Campaign Abuses Remote Monitoring Tools to Attack Organizations
A sophisticated spam campaign targeting Brazilian organizations has emerged, exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access to corporate networks. Discovered in early 2025, this attack campaign specifically targets Portuguese-speaking users through deceptive emails that trick…
New Attack Exploiting X/Twitter Advertising Display URL Feature to Trick Users
A sophisticated financial scam has emerged on X/Twitter, exploiting a critical vulnerability in the platform’s advertising display URL feature. Cybersecurity researchers have uncovered a campaign that tricks users by displaying trusted domain names in advertisements while redirecting victims to malicious…
The Invisible Storm: Why Cloud Malware Is Your Business’s New Weather Emergency
Remember when a storm warning meant boarding up windows and stocking up on batteries? For today’s businesses, the most dangerous storms aren’t brewing in the atmosphere but forming in the cloud, where a new generation of malware threatens to rain…
New DOGE Big Balls Ransomware Using Open-Source Tools & Custom Scripts to Infect Victim Machines
Cybersecurity researchers have identified a sophisticated new ransomware variant called “DOGE Big Balls,” which appears to be a modified version of the existing Fog ransomware family. The malware, provocatively named after the Department of Government Efficiency (DOGE), employs a complex…