Tag: Cyber Security News

Scavenger Malware Hijacks Popular npm Packages to Attack Developers

A sophisticated supply chain attack targeting JavaScript developers emerged on Friday, July 18th, 2025, when cybercriminals compromised multiple popular npm packages to distribute the newly identified “Scavenger” malware. The attack primarily focused on eslint-config-prettier, a widely-used code formatting package, along…

Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network

A groundbreaking investigation has pulled back the curtain on one of Russia’s most clandestine intelligence operations, revealing unprecedented details about the Federal Security Service’s (FSB) 16th Center and its extensive signals intelligence network. The research, conducted by CheckFirst analysts over…

Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet

Cybersecurity researchers have uncovered a sophisticated attack campaign targeting poorly managed Linux servers through SSH brute force attacks to deploy the SVF Botnet, a Python-based distributed denial-of-service malware. The malware leverages Discord as its command-and-control infrastructure and employs multiple proxy…

How to Conduct a Secure Code Review – Tools and Techniques

Secure code review represents a critical security practice that systematically examines software source code to identify and remediate security vulnerabilities before they reach production environments. This comprehensive examination serves as a proactive defense mechanism, enabling development teams to detect security…

How to Use Threat Intelligence to Enhance Cybersecurity Operations

Threat intelligence represents a paradigm shift from reactive to proactive cybersecurity, providing organizations with actionable insights to detect, prevent, and respond to cyber threats more effectively. By leveraging structured data about current and emerging threats, security teams can make informed…

Apache Jena Vulnerability Leads to Arbitrary File Access or Manipulation

Apache Jena has disclosed two significant security vulnerabilities affecting versions through 5.4.0, prompting an immediate upgrade recommendation to version 5.5.0.  Both CVE-2025-49656 and CVE-2025-50151, announced on July 21, 2025, represent important severity flaws that exploit administrative access to compromise server…

Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution

Multiple security vulnerabilities affecting Sophos firewall products, with two enabling pre-authentication remote code execution that could allow attackers to compromise systems without valid credentials.  The vulnerabilities, tracked as CVE-2025-6704, CVE-2025-7624, CVE-2025-7382, CVE-2024-13974, and CVE-2024-13973, impact various configurations of Sophos Firewall…