A sophisticated cyber threat has emerged in recent weeks as threat actors have developed a new technique leveraging IPv6 stateless addressing to conduct Adversary-in-the-Middle (AiTM) attacks. The attack relies on a novel tool called “Spellbinder” that manipulates IPv6 neighbor discovery…
Tag: Cyber Security News
7 Malicious PyPI Packages Abuse Gmail’s SMTP Protocol to Execute Malicious Commands
A sophisticated software supply chain attack leveraging Python Package Index (PyPI) repositories to deploy malware using Google’s SMTP infrastructure as a command-and-control mechanism. The campaign involved seven malicious packages – Coffin-Codes-Pro, Coffin-Codes-NET2, Coffin-Codes-NET, Coffin-Codes-2022, Coffin2022, Coffin-Grave, and cfc-bsb – which…
Windows RDP Bug Allows Login With Expired Passwords – Microsoft Confirms No Fix
Microsoft has confirmed that its Remote Desktop Protocol (RDP) allows users to log into Windows machines using passwords that have already been changed or revoked. The company says it has no plans to change this behavior, describing it as an…
Hackers Using New Eye Pyramid Tool to Leverage Python & Deploy Malware
Cybersecurity experts have identified a sophisticated hacking tool called “Eye Pyramid” being actively deployed in malicious campaigns since mid-January 2025. This tool, originally open-sourced on GitHub in 2022, has only recently gained traction among threat actors, leveraging Python to deploy…
New Attack Techniques Using MCP & How It Will be Used to Build Security Tools
A sophisticated new attack technique known as Malicious Command Protocol (MCP) has emerged in recent weeks, raising significant concerns among cybersecurity professionals worldwide. This novel threat leverages previously unexploited vulnerabilities in command and control infrastructures, allowing attackers to establish persistent…
NVIDIA TensorRT-LLM High-Severity Vulnerability Let Attackers Remote Code
NVIDIA has disclosed and patched a high-severity vulnerability in its TensorRT-LLM framework that could allow attackers with local access to execute malicious code, tamper with data, and potentially compromise AI systems. The vulnerability, tracked as CVE-2025-23254, affects all versions of…
CISA Warns of SonicWall SMA100 OS Command Injection Vulnerability Exploited in Wild
CISA has added the SonicWall SMA100 OS Command Injection Vulnerability, tracked as CVE-2023-44221, to its Known Exploited Vulnerabilities (KEV) catalog. According to CISA’s May 1, 2025 advisory, this vulnerability is actively being exploited in the wild, posing a substantial risk…
LummaStealer’s FakeCAPTCHA Steals Browser Credentials Via Weaponized Microsoft Word Files
Cybercriminals have refined their attack methodologies with a sophisticated campaign leveraging LummaStealer malware and deceptive CAPTCHA prompts to harvest sensitive data. This social engineering approach combines psychological manipulation with lightweight payload delivery, enabling threat actors to bypass traditional security controls…
Nebulous Mantis Hackers Actively Deploying RomCom RAT to Attack Organizations Worldwide
Cybersecurity experts have uncovered a sophisticated espionage campaign orchestrated by the threat actor group known as Nebulous Mantis, utilizing an advanced remote access trojan called RomCom to target organizations globally. The campaign employs deceptive spear-phishing tactics coupled with multi-stage malware…
Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses
The Windows security landscape has dramatically evolved in early 2025, marked by increasingly sophisticated attack vectors and Microsoft’s accelerated defensive innovations. February 2025 witnessed a sharp 87% increase in ransomware incidents globally, with 956 reported victims compared to January. As…
AiTM Phishing Kits Bypassing MFA By Intercepting Credentials & Tokens
Adversary-in-the-Middle (AiTM) phishing kits are emerging as sophisticated threats specifically designed to circumvent multi-factor authentication (MFA), once considered an impenetrable defense against account compromises. Tycoon 2FA, first identified in August 2023, represents the latest evolution in this concerning trend, operating…
Harrods Store Hit by Cyber Attack Following Marks & Spencer and Co-op
Harrods, the world-renowned luxury department store in Knightsbridge, has confirmed it was the target of a sophisticated cyberattack, marking it as the third major UK retailer to be hit by cybercrime within a week. The news follows similar incidents reported…
Trellix Unveils New Phishing Simulator to Proactively Identify & Mitigate Phishing Attacks
In a significant advancement for cybersecurity training, Trellix has introduced its new Phishing Simulator, designed to strengthen organizational defenses against one of the most persistent threat vectors in today’s digital landscape. Announced on April 29, 2025, this comprehensive solution enables…
CISA Warns of Apache HTTP Server Escape Vulnerability Exploited in the Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-38475, a critical vulnerability affecting Apache HTTP Server, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability allows attackers to map URLs to unintended filesystem locations, potentially leading to code execution…
Zero Trust Implementation – A CISO’s Essential Resource Guide
Zero Trust implementation is essential in today’s rapidly evolving digital landscape, as traditional perimeter-based security can no longer defend against sophisticated cyber threats. The rise in remote work, cloud adoption, and interconnected systems has expanded the attack surface, making it…
The CISO’s Role in Securing IoT in a Connected World
The rapid proliferation of IoT devices from smart manufacturing sensors to healthcare wearables—has transformed organizational operations and expanded risk landscapes, making Securing IoT for CISOs a growing priority. For Chief Information Security Officers (CISOs), this evolution demands a recalibration of…
How CISOs Can Leverage Threat Intelligence to Stay Proactive
In today’s digital era, Chief Information Security Officers (CISOs) are under immense pressure to protect their organizations from increasingly sophisticated cyber threats. The threat landscape is dynamic, with adversaries constantly evolving their tactics and exploiting new vulnerabilities. Traditional reactive security…
Building a Resilient Cyber Defense – CISO Strategies Unveiled
In today’s hyperconnected business environment, building a resilient cyber defense is crucial. Cyber threats have evolved into persistent and sophisticated challenges that jeopardize organizational stability. Chief Information Security Officers (CISOs) now operate at the frontline of an invisible war, where…
How CISOs Can Successfully Lead Security Transformation in Hybrid Work Environments
As organizations increasingly adopt hybrid work models, Chief Information Security Officers (CISOs) face new and complex challenges. The traditional boundaries of enterprise security have dissolved, and sensitive data now flows across home offices, cloud platforms, and corporate networks. This shift…
The CISO’s Playbook for Managing Third-Party Vendor Risks
In today’s interconnected business landscape, organizations increasingly rely on third-party vendors to provide specialized services, enhance operational efficiency, and reduce costs. However, with 98% of companies exposed to risks via these external relationships, vendor risk management has become a critical…