Tag: Cyber Security News

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Critical vulnerabilities in Apache Tomcat and Apache Camel are being actively exploited by cybercriminals worldwide, with security researchers documenting over 125,000 attack attempts across more than 70 countries since their disclosure in March 2025. The three vulnerabilities—CVE-2025-24813 affecting Apache Tomcat…

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

The .COM top-level domain continues to dominate the cybercriminal landscape as the primary vehicle for hosting credential phishing websites, maintaining its position as the most extensively abused TLD by threat actors worldwide. Recent intelligence indicates that malicious actors leverage the…

Pro-Russian Hackers Making New Alliances to Launch High-Profile Attacks

The cybersecurity landscape has witnessed a dramatic escalation in pro-Russian hacktivist activities since the onset of 2025, with emerging alliances between established and newly formed groups launching increasingly sophisticated attacks against Western infrastructure. These cyber operations, driven by geopolitical tensions…

Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce

Microsoft Corporation has confirmed a significant workforce reduction affecting approximately 9,000 employees, representing nearly 4% of its global workforce.  This strategic restructuring comes as the technology giant continues to navigate the complex landscape of artificial intelligence infrastructure investments while maintaining…

Top 30 Best Penetration Testing Tools – 2025

Penetration testing, also known as ethical hacking, is a critical process in cybersecurity aimed at identifying and addressing vulnerabilities within systems, networks, and applications. By simulating real-world attacks, penetration testing helps organizations uncover weaknesses before malicious actors can exploit them.…

CISA Warns of Chrome 0-Day Vulnerability Exploited in Attacks

CISA has issued an urgent warning about a critical zero-day vulnerability in Google Chrome that attackers are actively exploiting in the wild.  The vulnerability, designated CVE-2025-6554, affects the Chromium V8 JavaScript engine and has been added to CISA’s Known Exploited…

10 World’s Best Cyber Security Companies – 2025

In 2025, cybersecurity is not just a technical requirement it’s a fundamental pillar of modern business resilience and digital trust. As organizations worldwide accelerate their digital transformation, move to hybrid and multi-cloud environments, and embrace remote workforces, the threat landscape…

Top 10 Best Penetration Testing Tools – 2025

In today’s hyper-connected world, cyber threats are more advanced, persistent, and damaging than ever before. Organizations, regardless of their size or industry, face relentless attempts from hackers seeking to exploit vulnerabilities and gain unauthorized access to sensitive data. As we…

Cl0p Ransomware Data Exfiltration Vulnerable to RCE Attacks

A newly identified security vulnerability in the Cl0p ransomware group’s data exfiltration utility has exposed a critical remote code execution (RCE) flaw that security researchers and rival threat actors could potentially exploit.  The vulnerability, designated as GCVE-1-2025-0002, was published on…

AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic

The digital landscape is experiencing a fundamental transformation as artificial intelligence crawlers emerge as dominant forces across the global internet infrastructure. Recent analysis reveals that automated bots now account for approximately 30% of all worldwide web traffic, marking a significant…

Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags

A newly discovered denial-of-service vulnerability in the ModSecurity Web Application Firewall (WAF) engine has security experts on high alert. The flaw, designated CVE-2025-52891, affects specific versions of mod_security2 and can be triggered by processing XML requests containing empty tags, potentially causing complete service…

CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks

CISA has issued an urgent warning regarding two critical vulnerabilities in TeleMessage TM SGNL that threat actors are currently exploiting in active attack campaigns. The vulnerabilities, tracked as CVE-2025-48927 and CVE-2025-48928, pose significant security risks to organizations utilizing this communication…

International Criminal Court Hit by New Sophisticated Cyber Attack

The International Criminal Court (ICC) has successfully detected and contained a sophisticated cybersecurity incident that targeted the judicial institution late last week.  This marks the second major cyber attack of this type against the ICC in recent years, highlighting the…

10 Best VPN Alternative Solutions In 2025

As digital security and privacy demands evolve, users and businesses are increasingly seeking VPN alternatives that offer more robust protection, better scalability, and seamless remote access. While traditional VPNs remain popular, their limitations such as latency, complex management, and scalability…

Snake Keyloggers Abuse Java Utilities to Evade Security Tools

A sophisticated phishing campaign leveraging the Snake Keylogger malware has emerged, exploiting legitimate Java debugging utilities to bypass security mechanisms and target organizations worldwide. The Russian-originated .NET malware, distributed through a Malware as a Service (MaaS) model, represents a significant…

Cyber Threat Intelligence: 3 Key Benefits For SOCs And MSSPs

As attack vectors multiply and threat actors become increasingly sophisticated, security teams struggle to keep pace with the volume and complexity of modern cyber threats. SOCs and MSSPs operate in a high-stakes environment where every minute counts.  Main Challenges Of…

New C4 Bomb Attack Bypasses Chrome’s AppBound Cookie Encryption

A critical vulnerability that allows low-privileged attackers to decrypt Chrome’s AppBound Cookie Encryption, a security feature Google introduced in July 2024 to protect user cookies from infostealer malware.  The attack, dubbed C4 (Chrome Cookie Cipher Cracker), exploits a Padding Oracle…

Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely

A critical remote code execution (RCE) vulnerability affecting Django web applications, demonstrating how seemingly benign CSV file upload functionality can be weaponized for complete server compromise.  Summary1. Django RCE exploit chains directory traversal with CSV parser abuse to compromise servers…

North Korean Remote IT Workers Added New Tactics and Techniques to Infiltrate Organizations

North Korean state-sponsored remote IT workers have significantly evolved their infiltration tactics, incorporating artificial intelligence tools and sophisticated deception techniques to penetrate organizations worldwide. Since 2024, these highly skilled operatives have enhanced their fraudulent employment schemes by leveraging AI-powered image…

Top 20 Best Endpoint Management Tools – 2025

Endpoint management is now a cornerstone of modern IT operations, enabling organizations to secure, monitor, and optimize devices across diverse environments. As hybrid and remote work models continue to expand, the need for robust endpoint management tools is greater than…

CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, Department of Defense Cyber Crime Center, and National Security Agency, has issued an urgent warning regarding potential cyber attacks by Iranian-affiliated actors targeting U.S. critical infrastructure. Despite ongoing ceasefire…

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

A sophisticated new phishing campaign has emerged, leveraging obsolete Windows file formats and advanced evasion techniques to distribute the notorious Remcos Remote Access Trojan. The attack chain employs DBatLoader as its primary delivery mechanism, utilizing a combination of User Account…

25 Best Managed Security Service Providers (MSSP) In 2025

Managed Security Service Providers (MSSPs) are specialized companies that deliver outsourced cybersecurity services to protect businesses from evolving cyber threats. These providers offer a range of services, including 24/7 threat monitoring, incident response, vulnerability management, and compliance support. MSSPs help…

Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds

A major security flaw affecting millions of Bluetooth headphones and earbuds has been discovered, allowing attackers to remotely hijack devices and spy on users without requiring any authentication or pairing.  The vulnerabilities, identified by cybersecurity researchers at ERNW, affect devices…

10 Best Android Password Managers 2025

Looking for the best Android password managers in 2025? You’re in the right place. With growing online threats and more accounts than ever, using a reliable Android password manager is essential to protect your digital identity. Whether you’re storing credentials,…

25 Best Managed Security Service Providers (MSSP) in 2025

Managed Security Service Providers (MSSPs) are specialized companies that deliver outsourced cybersecurity services to protect businesses from evolving cyber threats. These providers offer a range of services, including 24/7 threat monitoring, incident response, vulnerability management, and compliance support. MSSPs help…

Weaponized DeepSeek Installers Delivers Sainbox RAT and Hidden Rootkit

Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting the popularity of artificial intelligence tools to target Chinese-speaking users. The attack leverages fake installers masquerading as legitimate software downloads, including the popular AI chatbot DeepSeek, to deploy advanced persistent threats…

KC Man Hacked Computers to Pitch For Cybersecurity Services Pleaded Guilty

A Kansas City man has admitted to infiltrating a nonprofit organization’s computer network using sophisticated hacking techniques in what authorities describe as an elaborate scheme to demonstrate cybersecurity vulnerabilities.  Nicholas Michael Kloster, 32, pleaded guilty on Wednesday to federal computer…

Let’s Encrypt to Issue Certificate for IP Address With 6-Day Validity

Let’s Encrypt, the world’s largest certificate authority, announced its readiness to begin issuing SSL/TLS certificates for IP addresses through its production environment, marking a significant advancement in internet security infrastructure.  The certificates will be available exclusively under the organization’s short-lived…