A severe security vulnerability has been discovered in the popular InstaWP Connect WordPress plugin, potentially exposing thousands of websites to remote attacks. Security researchers at Wordfence identified and reported the critical flaw (CVE-2025-2636), which allows unauthenticated attackers to execute arbitrary…
Tag: Cyber Security News
Microsoft Enhances Exchange & SharePoint Server Security With New Windows Antimalware Scan
Microsoft has announced a significant security upgrade for Exchange Server and SharePoint Server through integration with the Windows Antimalware Scan Interface (AMSI), providing critical protection for these business-critical systems that are frequent targets for cyberattacks. Exchange Server and SharePoint Server…
Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed
A detailed technical analysis has been published regarding CVE-2025-22457, an unauthenticated remote code execution (RCE) vulnerability impacting several Ivanti products. The vulnerability was recently exploited in the wild by a suspected China-nexus threat actor, affecting Ivanti Connect Secure, Pulse Connect…
Jenkins Docker Images Vulnerability Let Attackers Insert Themselves in Network Path
A critical security flaw in widely used Jenkins Docker images has been discovered, potentially compromising build pipelines across thousands of organizations. The vulnerability, disclosed in a Jenkins Security Advisory on April 10, 2025, affects SSH host key handling in certain…
AMD CPU Signature Verification Vulnerability Let Attackers Load Malicious Microcode
AMD has disclosed a significant security vulnerability that could allow attackers with administrative privileges to load unauthorized microcode patches into the company’s processors. Identified as CVE-2024-36347 with a CVSS score of 6.4 (Medium), this flaw affects a wide range of…
Windows Defender Antivirus Bypassed Using Direct Syscalls & XOR Encryption
A new sophisticated method to bypass Microsoft’s Windows Defender antivirus protection by combining direct syscalls with XOR encryption techniques. The research, published this week, reveals critical vulnerabilities in one of the most widely deployed security solutions that ships with every…
Microsoft Issues Urgent Patch to Resolve Office Update Crashes
Microsoft has issued an emergency patch addressing widespread crashes in Office 2016 applications following a problematic update. The fix, identified as KB5002623 and released on April 10, 2025, resolves critical issues that caused Microsoft Word, Excel, and Outlook to stop…
iOS 18.4 Update Introduces Critical Bug in Dynamic Symbol Resolution
Apple’s latest iOS 18.4 update has introduced a significant bug affecting dynamic symbol resolution on devices supporting Pointer Authentication Code (PAC). This issue, first observed by Fabien Perigaud, a noted reverse-engineering expert, has implications for applications relying on dynamic library…
SonicWall Patches Multiple Vulnerabilities in NetExtender VPN Client For Windows
SonicWall has released security updates addressing three critical vulnerabilities in its NetExtender VPN client for Windows. The flaws, which could potentially allow attackers to escalate privileges and manipulate system files, affect both 32-bit and 64-bit versions of the software prior…
Cable – A Post-Exploitation Toolkit For Active Directory Reconnaissance & Exploitation
Security researchers and penetration testers have a powerful new tool in their arsenal with the recent development of Cable, an advanced post-exploitation toolkit designed specifically for Active Directory environments. Created by developer Logan Goins, this .NET-based utility provides comprehensive capabilities…
Dell Warns of Critical PowerScale OneFS Vulnerabilities Allows User Account Takeover
Dell Technologies has issued a critical security advisory warning customers about multiple severe vulnerabilities in PowerScale OneFS that could allow attackers to take over high-privileged user accounts. The most severe flaw, assigned a CVSS score of 9.8, could enable unauthenticated,…
AkiraBot Spammed 80,000 Websites by Employing CAPTCHA Bypass & Network Evasion Techniques
A sophisticated Python framework dubbed “AkiraBot” has successfully targeted more than 80,000 websites since September 2024, using advanced techniques to bypass security measures and deliver AI-generated spam. The framework specifically targets small to medium-sized business websites, focusing on contact forms…
Researchers Uncovered Hacking Tools and Techniques Discussed on Russian-Speaking Hacking Forums
Recent investigations have revealed an intricate network of sophisticated hacking tools and methodologies being shared and developed within Russian-speaking cybercrime forums. Security researchers have infiltrated what they describe as “one of the most sophisticated and impactful ecosystems within the global…
Microsoft 365 Family Subscriptions Users Hit by Licensing Glitch Denies Services
Microsoft 365 Family subscribers are currently facing disruptions in accessing their services due to a potential licensing issue, as confirmed by Microsoft on Thursday, April 10, 2025. The tech giant has acknowledged the problem and is actively investigating the root…
CatB Ransomware Leveraging Microsoft Distributed Transaction Coordinator to Execute its Payload
The cybersecurity landscape has witnessed the emergence of a sophisticated threat actor with the appearance of CatB ransomware in late 2022. Also known as CatB99 or Baxtoy, this malware has gained significant attention for its advanced evasion capabilities and distinctive…
TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials
A critical vulnerability in the TP-Link Tapo H200 V1 IoT Smart Hub that could expose users’ Wi-Fi credentials to attackers. The flaw, assigned CVE-2025-3442, stems from the device’s firmware storing sensitive information in plain text, making it accessible to attackers…
SideCopy APT Hackers Mimic as Government Personnel to Deploy Open-Source XenoRAT Tool
A sophisticated campaign by the Pakistan-linked SideCopy Advanced Persistent Threat (APT) group has emerged since late December 2024, targeting critical Indian government sectors with enhanced tactics. The group has significantly expanded its scope beyond traditional defense and maritime sectors to…
HollowQuill Malware Attacking Government Agencies Worldwide Via Weaponized PDF Documents
A sophisticated malware campaign dubbed “HollowQuill” has emerged as a significant threat to academic institutions and government agencies worldwide. The attack leverages weaponized PDF documents disguised as research papers, grant applications, or official government communiques to entice unsuspecting victims into…
Russian APT Hackers Using Device Code Phishing Technique to Bypass MFA
A sophisticated cyber campaign orchestrated by the Russian state-backed group Storm-2372 has emerged, exploiting device code phishing tactics to circumvent Multi-Factor Authentication (MFA) security measures. This targeted approach represents a significant escalation in threat actors’ capabilities to defeat advanced security…
New Mirai Botnet Exploiting TVT DVRs To Gain Administrative Control
Cybersecurity researchers have identified a significant spike in exploitation attempts targeting TVT NVMS9000 digital video recorders (DVRs), with activity surging to three times normal levels in early April 2025. This new campaign appears to be linked to the infamous Mirai…