April 2025 witnessed a notable shift in the global ransomware landscape, with 470 reported victims worldwide representing a significant 29% decrease from March. Despite this numerical decline, ransomware operations continue to demonstrate increased sophistication and strategic targeting, indicating that threat…
Tag: Cyber Security News
Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters
Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass security filters, potentially exposing underlying web applications to various attacks. The vulnerabilities, tracked as CVE-2024-56523 and CVE-2024-56524, were publicly disclosed…
Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution
A critical security vulnerability in Ubiquiti UniFi Protect Cameras could allow attackers to execute arbitrary code remotely. The flaw, which received the highest possible CVSS score of 10.0, affects all camera firmware versions 4.75.43 and earlier, prompting an urgent call…
IXON VPN Client Vulnerability Let Attackers Escalate Privileges
Significant vulnerabilities in the IXON VPN Client allow local attackers to gain system-level privileges on Windows, Linux, and macOS systems. The flaws, tracked as CVE-2025-26168 and CVE-2025-26169, affect versions prior to 1.4.4 and could grant unauthorized users complete control over…
Which Browser is The Worst for Data Collection – Hope You Guessed It!
The web browsers serve as our primary gateway to the internet, but they also function as sophisticated data collection tools. Every click, search, and page visit generates valuable data that can be harvested, analyzed, and monetized by browser developers. As…
Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks
The cybersecurity landscape has witnessed a significant paradigm shift with Ransomware-as-a-Service (RaaS) emerging as the dominant business model for cybercriminals seeking financial gain through digital extortion. This subscription-based model has democratized ransomware attacks, allowing technically unskilled criminals to deploy sophisticated…
Researchers Details macOS Remote Code Execution Vulnerability – CVE-2024-44236
A critical remote code execution vulnerability identified in Apple’s macOS operating system, tracked as CVE-2024-44236. The vulnerability, which carries a high CVSS score of 7.8, could allow attackers to execute arbitrary code by tricking users into opening specially crafted files.…
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details
A significant vulnerability in Microsoft Bookings allowed attackers to manipulate meeting details by exploiting insufficient input validation. The flaw, which Microsoft has largely remedied, enabled malicious actors to inject arbitrary HTML into meeting invitations, alter calendar entries, and potentially facilitate…
Iranian Hackers Impersonate as Model Agency to Attack Victims
In a sophisticated cyber espionage campaign, Iranian threat actors have deployed a fraudulent website impersonating a legitimate German modeling agency to gather intelligence and potentially target specific individuals. The operation, discovered in early May 2025, features advanced visitor profiling techniques…
Nmap 7.96 Released With New Scanning Features & Upgraded Libraries
The Nmap Project has officially released version 7.96 of its powerful network scanning tool. The release introduces a suite of technical enhancements, including dramatically faster DNS resolution, new NSE (Nmap Scripting Engine), and numerous bug fixes that further enhance Nmap’s…
OneDrive New Feature Allows Default Sync of Personal & Corporate Accounts
Microsoft is rolling out a new OneDrive feature this month that allows users to sync their personal accounts with corporate accounts by default, raising significant security concerns among IT professionals. The feature, officially titled “Prompt to Add Personal Account to…
Detecting Vulnerable Commvault Environments Within Azure Using KQL Query
Cybersecurity analysts are racing to respond to an active exploitation campaign targeting Commvault environments in Microsoft Azure through the recently identified CVE-2025-3928 vulnerability. This critical vulnerability, which enables authenticated attackers to compromise web servers through the creation and execution of…
Multiple SonicWall SMA 100 Vulnerabilities Let Attackers Compromise Systems
SonicWall has disclosed multiple high-severity vulnerabilities affecting its Secure Mobile Access (SMA) 100 series products. Security researchers from Rapid7 discovered three significant post-authentication vulnerabilities that, when chained together, could lead to complete system compromise with root-level access. The flaws impact…
Apache ActiveMQ Vulnerability Let Attackers Trigger DoS Condition
A significant vulnerability has been discovered in Apache ActiveMQ, the widely used open-source message broker. The flaw, officially tracked as CVE-2025-27533, enables remote attackers to trigger a Denial of Service (DoS) condition by exploiting improper memory allocation during the handling…
AI Polluting Bug Bounty Platforms with Fake Vulnerability Reports
Bug bounty programs, once celebrated for incentivizing independent researchers to report real-world vulnerabilities, are now facing a significant challenge from AI-generated fake vulnerability reports. These fabricated submissions, known in the industry as “AI slop,” are increasingly wasting maintainers’ time and,…
CoGUI Phish Kit Impersonate Well-Known Companies to Attack Users & Steal Credentials
A sophisticated phishing framework known as CoGUI has emerged as a significant threat, primarily targeting organizations in Japan with millions of phishing messages since October 2024. The kit impersonates popular consumer and finance brands, including Amazon, PayPay, Rakuten, and various…
Russian COLDRIVER Hackers Using LOSTKEYS Malware To Steal Sensitive Data
Cybersecurity researchers have uncovered a sophisticated malware campaign attributed to the Russian threat actor COLDRIVER, also known as Star Blizzard or Callisto. The newly identified malware, dubbed LOSTKEYS, has been observed targeting diplomatic institutions, defense contractors, and critical infrastructure organizations…
Qilin Has Emerged as The Top Ransomware Group in April with 74 Cyber Attacks
In a significant shift within the cybercriminal ecosystem, Qilin ransomware group has surged to prominence in April 2025, orchestrating 74 cyber attacks globally according to the latest threat intelligence report. This dramatic rise follows the unexpected disappearance of RansomHub, which…
Lockbit Ransomware Hacked – Leaked Database Exposes Internal Chats
The notorious LockBit ransomware operation has suffered a significant breach. Attackers defaced their dark web infrastructure and leaking a comprehensive database containing sensitive operational details on May 7. The hack represents a major blow to one of the world’s most…
Beware of Fake Social Security Statement That Tricks Users to Install Malware
A sophisticated phishing campaign targeting Americans is currently making rounds via fake Social Security Administration (SSA) emails. These convincingly crafted messages inform recipients that their Social Security Statement is available for download, encouraging them to click on an attached file.…