Tag: Cyber Security News

HPE OneView for VMware vCenter Allows Escalation of Privileges

A significant security vulnerability in Hewlett-Packard Enterprise OneView for VMware vCenter (OV4VC) platform that could allow attackers with limited access to escalate their privileges to administrative levels.  The vulnerability, tracked as CVE-2025-37101, affects all versions of the software prior to…

Iranian Spear-Phishing Attack Mimic Google, Outlook, and Yahoo Domains

A sophisticated Iranian cyber espionage campaign has resurfaced with renewed intensity, targeting high-profile figures through meticulously crafted spear-phishing operations that impersonate major email providers including Google, Outlook, and Yahoo. The campaign, attributed to the threat actor known as Educated Manticore,…

Researchers Obfuscated & Weaponized .NET Assemblies Using MacroPack

The cybersecurity landscape has witnessed a significant evolution in malware sophistication, with threat actors increasingly leveraging legitimate programming frameworks for malicious purposes. A recent development has emerged involving the weaponization of .NET assemblies through advanced obfuscation techniques, marking a concerning…

CISA Warns of D-Link Path Traversal Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding a critical path traversal vulnerability affecting D-Link DIR-859 routers that is being actively exploited in the wild.  The vulnerability, designated as CVE-2024-0769, was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on June…

Cybercriminals Abuse LLM Models to Aid in Their Criminal Hacking Activities

The cybersecurity landscape has witnessed a concerning evolution as threat actors increasingly leverage artificial intelligence technologies to enhance their malicious operations. Large Language Models (LLMs), which have revolutionized legitimate applications across industries, are now being systematically exploited by cybercriminals to…

25-Year-Old British National Believed To Be IntelBroker Charged

Federal prosecutors in the Southern District of New York have filed criminal charges against Kai West, a 25-year-old British national allegedly operating under the notorious hacker alias “IntelBroker.”  The comprehensive complaint reveals a sophisticated cybercriminal operation that has caused approximately…

IBM i Vulnerability Allows Let Attackers Escalate Privileges

A critical security vulnerability affecting multiple versions of IBM i that could allow attackers to escalate privileges through an unqualified library call in IBM Facsimile Support for i.  The vulnerability, tracked as CVE-2025-36004, carries a high CVSS base score of…

Researchers Manipulated Windows Registry Using a C++ Program

Researchers demonstrated sophisticated Windows Registry manipulation techniques using a C++ program designed for red team operations. The research highlights critical vulnerabilities in how Windows systems handle registry modifications and presents both offensive capabilities and defensive strategies for cybersecurity professionals. Windows…

Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger

The Androxgh0st botnet has significantly expanded its operations since 2023, with cybercriminals now compromising prestigious academic institutions to host their command and control infrastructure. This sophisticated malware campaign has demonstrated remarkable persistence and evolution, targeting a diverse range of vulnerabilities…

TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts

A sophisticated cyberattack campaign has weaponized a legitimate penetration testing framework to compromise thousands of Microsoft cloud accounts across hundreds of organizations worldwide. The malicious operation, designated UNK_SneakyStrike, leverages TeamFiltration, a popular cybersecurity tool originally designed for Office 365 security…

Firefox 140 Released With Fix for Code Execution Vulnerability – Update Now

Mozilla has released Firefox 140, addressing multiple critical security vulnerabilities, including a high-impact use-after-free vulnerability that could lead to code execution.  The update patches twelve distinct security flaws ranging from memory safety issues to platform-specific vulnerabilities affecting both desktop and…

Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested

French authorities have dismantled a major cybercrime operation, arresting five hackers who operated BreachForum, one of the world’s largest marketplaces for stolen data, in coordinated raids across France. French police initially suspected the cybercriminals operating BreachForum were Russian or hiding…

Multiple Brother Devices Vulnerabilities Open Devices for Hacking

A comprehensive security research investigation has unveiled eight critical vulnerabilities affecting 742 printer and multifunction device models across four major manufacturers. The discovery, stemming from a zero-day research project conducted by cybersecurity firm Rapid7, exposes severe security flaws in Brother…

NetNerve – AI Powered PCAP Analysis to Detect Anomalies & Potential Threats

A groundbreaking cybersecurity solution called NetNerve has emerged as a game-changer in network threat detection, leveraging artificial intelligence to analyze Packet Capture (PCAP) files with unprecedented accuracy and speed.  This innovative platform represents a significant advancement in proactive cybersecurity measures,…

Windows 11 Update Configuration Hangs During Update Scanning

Microsoft has released a critical Windows configuration update in June 2025 to address a significant issue affecting Windows 11 users worldwide.  The update targets a persistent problem where the Windows Update scanning mechanism becomes unresponsive, preventing users from checking for…

Akamai Shares New Techniques for Defenders to Shutdown Cryptominer Attacks

Cybersecurity researchers at Akamai have unveiled groundbreaking defensive techniques capable of completely shutting down cryptomining botnets, marking a significant advancement in the fight against cryptocurrency-based cybercrime. The innovative approach, detailed in the final installment of Akamai’s “Cryptominers’ Anatomy” blog series,…

NVIDIA Megatron LM Vulnerability Let Attackers Inject Malicious Code

Critical security vulnerabilities in NVIDIA Megatron LM large language model framework that could allow attackers to inject malicious code and gain unauthorized system access.  The company released emergency security patches on June 24, 2025, addressing two high-severity vulnerabilities that affect…

CISA Issued ICS Advisories Covering Current Vulnerabilities and Exploits

CISA has issued eight Industrial Control Systems (ICS) advisories on June 24, 2025, highlighting significant security vulnerabilities across multiple vendors’ systems.  The advisories, coded as ICSA-25-175-01 through ICSA-25-175-07, plus an update to a previously identified vulnerability (ICSA-19-029-02 Update B), provide…

APT Hackers Abuse Microsoft ClickOnce to Execute Malware as Trusted Host

A sophisticated new APT malware campaign has emerged, specifically targeting critical energy, oil, and gas infrastructure through an advanced exploitation of Microsoft ClickOnce technology. The campaign, designated as OneClik by cybersecurity researchers, represents a significant evolution in attack methodologies, demonstrating…

New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands

A novel social engineering technique called “FileFix” that exploits Windows File Explorer’s address bar functionality to execute malicious commands, presenting a dangerous alternative to the increasingly popular ClickFix attack method. The technique, discovered by security researcher mr.d0x, leverages browser file…

Threat Actors Abuse ConnectWise Configuration to Build a Signed Malware

A sophisticated malware campaign has emerged that exploits legitimate ConnectWise remote access software to create validly signed malicious applications, representing a significant evolution in cybercriminal tactics. Since March 2025, security researchers have observed a dramatic increase in attacks using what…

Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number

A sophisticated scam operation targeting major American companies, including Netflix, Microsoft, and Bank of America, where attackers manipulate legitimate websites to display fraudulent phone numbers.  The attack, technically classified as a search parameter injection attack, exploits vulnerabilities in website search…

2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

A sophisticated phishing campaign masquerading as official Social Security Administration (SSA) communications has successfully compromised more than 2,000 devices, according to a recent investigation. The attack, which leverages the trust associated with government correspondence, represents a concerning evolution in social…

OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data

A critical security vulnerability has been discovered in OPPO’s Clone Phone feature that could expose sensitive user data through inadequately secured WiFi hotspots.  The vulnerability, designated CVE-2025-27387, affects ColorOS 15.0.2 and earlier versions, presenting a high-severity risk with a CVSS…

Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers

A sophisticated malware campaign has emerged targeting WordPress and WooCommerce websites with highly obfuscated credit card skimmers and credential theft capabilities, representing a significant escalation in e-commerce cyberthreats. The malware family demonstrates advanced technical sophistication through its modular architecture, featuring…

WhatsApp Banned on U.S. House Staffers Devices Due to Potential Security Risks

The U.S. House of Representatives has implemented a comprehensive ban on the WhatsApp messaging application across all government-issued devices used by congressional staffers, marking a significant escalation in federal cybersecurity protocols.  The Chief Administrative Officer (CAO) issued the directive Monday,…

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs

This comprehensive guide provides SOC analysts and MSSP teams with practical threat hunting techniques using advanced threat intelligence platforms. Modern threat actors continuously develop sophisticated evasion techniques, making traditional detection methods insufficient for comprehensive security operations. The strategies outlined here…

Steelmaker Nucor Hacked – Attackers Gained Unauthorized Access to IT Systems

Charlotte-based steel giant Nucor Corporation disclosed a significant cybersecurity incident where threat actors gained unauthorized access to the company’s information technology infrastructure.  The breach prompted temporary production shutdowns across multiple facilities as the company implemented emergency containment protocols and engaged…

Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support

IPFire has released Core Update 195 for version 2.29, marking a significant milestone with the introduction of native WireGuard VPN protocol support.  This highly anticipated update transforms the open-source firewall distribution by integrating modern VPN capabilities alongside comprehensive security enhancements…

APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack

A Pakistan-based cyber espionage group known as APT36 or Transparent Tribe has launched a highly sophisticated phishing campaign targeting Indian defense personnel, utilizing credential-stealing malware designed to establish long-term infiltration within sensitive military networks. The campaign represents a significant escalation…

Shadow Vector Malware Weaponizes SVG Images to Deploy AsyncRAT and RemcosRAT

A sophisticated malware campaign dubbed Shadow Vector is actively targeting users in Colombia through malicious Scalable Vector Graphics (SVG) files that act as decoys for deploying dangerous remote access tools. The campaign distributes spear-phishing emails impersonating trusted Colombian institutions, particularly…

North Korean Hackers Weaponizes Github Infrastructure Used to Deliver Malware

A sophisticated cyber espionage campaign has emerged, demonstrating how North Korean threat actors are increasingly leveraging legitimate cloud platforms to distribute malware and establish persistent command and control infrastructure. Security researchers have uncovered a complex spearphishing operation that exploits GitHub’s…

DDoS Attack Crippling Financial Sectors, Leds to Multi-Day Outages

Recent DDoS attacks have evolved from mere nuisances to strategic threats capable of paralyzing financial institutions for extended periods. The financial services sector has emerged as the primary target of these sophisticated attacks, which are designed to overwhelm digital infrastructure…

Microsoft Family Safety Blocking All the Version of Chrome Browsers

Microsoft Family Safety’s recent update has triggered an unexpected system-wide blocking of Google Chrome browsers across all versions, creating significant operational challenges for educational institutions and families utilizing Windows devices with parental controls enabled. The issue, which emerged on June…

DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats

DuckDuckGo has significantly upgraded its Scam Blocker feature to protect users against a broader range of digital threats, including sham e-commerce platforms, fake cryptocurrency exchanges, and “scareware” tactics.  This enhancement comes as consumers reported $12.5 billion in fraud losses to…

How Smart Timesheet Software Is Changing the Way of Work

As an employee have been managing projects in remote, hybrid, and traditional work environments, employees have always faced the same challenge: the inability to understand where time, actually is spent. Regular tasks are not completed on time as they are…

Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank

Microsoft has acknowledged a significant bug affecting OneDrive personal accounts that is causing search results to appear blank, preventing users from locating files they know exist within their cloud storage. The tech giant is actively investigating the issue, which appears…

Microsoft Announces New Security Defaults for Windows 365 Cloud PCs

Microsoft unveiled significant security enhancements for Windows 365 Cloud PCs on June 18, 2025, introducing new default configurations that prioritize data protection and system integrity.  The updates include disabling clipboard, drive, USB, and printer redirections by default, while enabling advanced…