Tag: Cyber Security News

How to Secure Kubernetes Clusters – A Cybersecurity Perspective

Kubernetes has become the de facto standard for container orchestration, but its complex architecture introduces numerous security challenges that organizations must address proactively. Securing a Kubernetes cluster requires a multi-layered approach encompassing control plane protection, robust authentication mechanisms, network segmentation,…

Phishing Defense Strategies – Advanced Techniques for Email Security

Modern phishing attacks have evolved far beyond simple deceptive emails, now incorporating AI-generated content, deepfake impersonation, and sophisticated social engineering techniques that bypass traditional security measures. Organizations face an unprecedented challenge as cybercriminals leverage artificial intelligence to create compelling phishing…

FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings

Fortinet has disclosed a new security vulnerability affecting its FortiOS SSL-VPN web-mode that allows authenticated users to gain unauthorized access to complete SSL-VPN configuration settings through specially crafted URLs. The vulnerability, designated as CVE-2025-25250, was published today and affects multiple…

Global Heroku Outage Disrupts Web Platforms Worldwide

Salesforce’s cloud platform Heroku is currently experiencing a widespread service disruption that has affected thousands of businesses around the globe. The outage, which began earlier today, has crippled critical platform services including authentication systems and deployment pipelines, leaving developers unable…

Free vs. Paid Threat Intelligence Feeds: What SOC Managers Need To Know

In today’s dynamic threat landscape, Threat Intelligence (TI) feeds have become a must-have for Security Operations Centers (SOCs). Whether free or paid, they offer vital insights helping teams identify threats, develop detection rules, enrich alerts, and accelerate incident response.   Threat intelligence feeds…

New SharePoint Phishing Attacks Using Lick Deceptive Techniques

A sophisticated new wave of phishing attacks is exploiting Microsoft SharePoint’s trusted platform to bypass traditional security measures, representing a significant evolution in cyberthreat tactics. These attacks leverage SharePoint’s inherent legitimacy within corporate environments to deceive users into believing they…

Understanding and Preventing SQL Injection Attacks – A Technical Guide

SQL injection represents one of the most persistent and dangerous web application vulnerabilities, consistently ranking among the top security threats in the OWASP Top 10.  This comprehensive technical guide explores the mechanics of SQL injection attacks, demonstrates practical exploitation techniques,…

Hardening Linux Servers – A Comprehensive Cybersecurity Checklist

Linux servers power much of our digital infrastructure, from corporate intranets to cloud services. Their security is paramount in today’s threat landscape. This comprehensive hardening guide provides concrete steps to secure your Linux servers against various attack vectors, complete with…

Fortinet OS Command Injection Vulnerability Lets Attackers Execute Unauthorised Code on FortiAnalyzer-Cloud

Fortinet, a leading provider of cybersecurity solutions, has recently addressed a significant security vulnerability, CVE-2023-42788, classified as an OS command injection issue under CWE-78. This vulnerability affects multiple products earlier including FortiManager, FortiAnalyzer, and today Fortinet confirmed that the vulnerability…

Canva Creators’ Data Exposed Via AI Chatbot Company Database

A significant data breach involving personal information from hundreds of Canva Creators program participants, exposed through an unsecured AI chatbot database operated by a Russian company.  The incident highlights emerging security vulnerabilities in the rapidly expanding artificial intelligence supply chain.…

SAP June 2025 Patch Day – 14 Vulnerabilities Patched Across Multiple Products

SAP released its monthly Security Patch Day update addressing 14 critical vulnerabilities across multiple enterprise products.  The comprehensive security update includes patches addressing critical authorization bypass issues and cross-site scripting vulnerabilities, with CVSS scores ranging from 3.0 to 9.6.  Organizations…

Sensata Technologies Hit by Ransomware Attack – Operations Impacted

Sensata Technologies, Inc., a prominent industrial technology company based in Attleboro, Massachusetts, has disclosed a significant cybersecurity incident that compromised the personal information of hundreds of individuals.  The external system breach, classified as a hacking incident, occurred on March 28,…

Google Vulnerability Let Attackers Access Any Google User Phone Number

A critical security vulnerability in Google’s account recovery system allowed malicious actors to obtain the phone numbers of any Google user through a sophisticated brute-force attack, according to a disclosure by a BruteCat security researcher published this week. The vulnerability,…

New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine

Cybersecurity researchers have identified a sophisticated new remote access trojan called DuplexSpy RAT that enables attackers to establish comprehensive surveillance and control over Windows systems. This multifunctional malware represents a growing trend in modular, GUI-driven threats that significantly lower the…

New Blitz Malware Attacking Windows Servers to Deploy Monero Miner

A sophisticated new malware campaign has emerged targeting Windows systems through an elaborate social engineering scheme involving backdoored gaming software. The Blitz malware, first identified in late 2024 and evolving through 2025, represents a concerning trend of cybercriminals exploiting gaming…

How to Use SIEM Tools for Real-Time Threat Monitoring

Real-time threat monitoring through Security Information and Event Management (SIEM) tools has become crucial for organizations seeking to defend against sophisticated cyberattacks. Real-time threat detection refers to the ability to identify and respond to cyber threats as they occur, minimizing…

Malicious npm Packages as Utilities Let Attackers Destroy Production Systems

Security researchers have uncovered a disturbing new threat in the npm ecosystem where malicious packages masquerade as legitimate utilities while harboring destructive backdoors capable of wiping entire production environments. These packages represent a significant escalation from traditional credential theft or…

Critical Wazuh Server RCE Vulnerability Exploited to Deploy Mirai Variants

Security researchers at Akamai have discovered active exploitation of a critical remote code execution vulnerability in Wazuh servers, marking the first reported in-the-wild attacks against the open-source security platform since the flaw’s disclosure earlier this year. The vulnerability, tracked as…

United Natural Foods Suffers Cyberattack – System Operations Halted

Major grocery distributor takes systems offline following security breach, disrupting supply chain operations. United Natural Foods, Inc. (UNFI), one of North America’s largest wholesale food distributors, is grappling with a significant cyberattack that has forced the company to halt critical…

OpenAI Banned ChatGPT Accounts Used by Russian, Iranian, and Chinese Hackers

OpenAI has disrupted a sophisticated network of state-sponsored threat actors from Russia, Iran, and China who were exploiting ChatGPT to conduct cyber operations, influence campaigns, and malware development.  The artificial intelligence company’s latest threat intelligence report, released in June 2025,…

Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram

A sophisticated tracking method employed by Meta (Facebook) and Yandex that potentially affected billions of Android users through covert web-to-app communications via localhost sockets.  The technique allowed native Android apps, including Facebook and Instagram, to silently receive browser metadata, cookies,…

GhostVendors – Hackers Registered 4000+ Domains Mimic popular Major Brands

A sophisticated scam operation dubbed “GhostVendors” that exploits over 4,000 fraudulent domains to impersonate dozens of major brands and defraud consumers through fake online marketplaces. Silent Push Threat Analysts revealed this massive campaign targets social networks, major brands, advertising companies,…

Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users

North Korean state-sponsored hackers from the notorious Kimsuky group have launched a sophisticated multi-platform campaign targeting users across Facebook, email, and Telegram platforms between March and April 2025. The Advanced Persistent Threat (APT) operation, dubbed the “Triple Combo” attack, represents…

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware

A new wave of cyberattacks has emerged targeting critical infrastructure through the exploitation of Fortigate security appliance vulnerabilities, with threat actors successfully deploying the notorious Qilin ransomware across multiple organizations. This sophisticated campaign leverages specific Common Vulnerabilities and Exposures (CVEs)…

Forensic Analysis in Cybersecurity – Tools and Techniques for Incident Response

Digital forensics has become an indispensable component of modern cybersecurity operations, enabling investigators to extract, analyze, and preserve digital evidence during security incidents. The sophisticated landscape of cyber threats demands equally advanced forensic methodologies that can rapidly identify attack vectors,…

Arkana Ransomware Group Allegedly Claims Breach of Ticketmaster Databases

Arkana Security Group claims to have successfully gained access to Ticketmaster’s database infrastructure and exfiltrated massive volumes of sensitive customer data. The threat actors have reportedly announced their intentions to sell comprehensive datasets containing ticket sales records, payment methodologies, customer…

Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide

A critical zero-day vulnerability discovered in Salesforce‘s default controller has exposed millions of user records across thousands of deployments worldwide.  The security flaw, found in the built-in aura://CsvDataImportResourceFamilyController/ACTION$getCsvAutoMap controller, allowed attackers to extract sensitive user information and document details through…

Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux

Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike. Kali GPT represents a significant breakthrough in the integration of…

Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts

Cybersecurity researchers have identified a sophisticated new social engineering campaign that exploits fundamental human trust in everyday computer interactions. The ClickFix technique, which has been actively deployed since March 2024, represents a dangerous evolution in cybercriminal tactics that bypasses traditional…

Beware of Fake AI Business Tools That Hides Ransomware

Cybercriminals are exploiting the growing demand for artificial intelligence solutions by disguising ransomware within legitimate-looking AI business tools, according to recent security research. This emerging threat specifically targets small businesses and entrepreneurs seeking to integrate AI capabilities into their operations,…

Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details

Korean cybersecurity researchers have uncovered a sophisticated malware campaign targeting cryptocurrency users worldwide, with ViperSoftX emerging as a persistent threat that continues to evolve its attack methodologies. First identified by Fortinet in 2020, this malware has demonstrated remarkable longevity and…

Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens

A significant security vulnerability affecting millions of Chrome extension users has been discovered, revealing widespread exposure of sensitive API keys, secrets, and authentication tokens directly embedded in extension code. This critical flaw stems from developers hardcoding credentials into their JavaScript…

Microsoft Unveils European Security Program to Target Cybercriminal Networks

To combat malicious actors across Europe, Microsoft has introduced a comprehensive European Security Program designed to tackle sophisticated cybercriminal networks targeting European infrastructure. Announced in Berlin on June 4, 2025, the initiative specifically targets ransomware groups and state-sponsored threat actors…

BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide

A sophisticated new variant of the BADBOX malware has successfully compromised over one million Android devices across multiple continents, representing one of the most significant mobile security breaches of 2025. This advanced persistent threat demonstrates enhanced evasion capabilities and has…

HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code

Multiple severe security vulnerabilities in HPE Insight Remote Support (IRS) platform that could allow attackers to execute remote code, traverse directories, and access sensitive information.  The vulnerabilities affect versions prior to 7.15.0.646 and pose significant risks to enterprise infrastructure management…

DCRat Attacking Users In Latin America To Steal Banking Credentials

A sophisticated malware campaign targeting Latin American users has emerged as a significant threat to the region’s banking sector, with cybercriminals deploying the DCRat banking trojan through elaborate phishing schemes designed to steal financial credentials. The malicious operations, which have…

Threat Actors Using Malware Loaders To Bypass Android 13+ Accessibility Restrictions

Cybercriminals have successfully circumvented Google’s Android 13 security enhancements designed to prevent malicious applications from abusing accessibility services, according to recent threat intelligence findings. The tech giant implemented these restrictions specifically to block accessibility access for sideloaded applications, a measure…

New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack

The cybersecurity landscape faces a growing threat from sophisticated botnet operations targeting Internet of Things (IoT) devices, with recent developments highlighting the vulnerability of connected cameras and smart devices. While specific details about the Eleven11bot malware remain limited in publicly…

VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code

Multiple Cross-Site Scripting (XSS) vulnerabilities in the VMware NSX network virtualization platform could allow malicious actors to inject and execute harmful code.  The security bulletin published on June 4, 2025, details three distinct vulnerabilities affecting VMware NSX Manager UI, gateway…

WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins

A sophisticated malware campaign targeting WordPress administrators has been discovered, utilizing a deceptive caching plugin to steal login credentials and compromise website security.  Security researchers have identified a malicious plugin disguised as “wp-runtime-cache” that specifically targets users with administrative privileges,…

Play Ransomware Hacked 900 Organizations, CISA Released TTPs & IOCs

Federal authorities have revealed that the notorious Play ransomware group has successfully breached approximately 900 organizations worldwide as of May 2025, marking a dramatic escalation in cybercriminal activity that has prompted an urgent security advisory from multiple government agencies. The…

Top 10 GPT Tools For Hackers, Penetration Testers, & Security Analysts

A recent analysis has identified ten advanced GPT models that are transforming the methodologies employed by hackers, penetration testers, and security analysts in 2025. These models are enhancing the precision and efficiency of security assessments, threat modeling, and vulnerability exploitation, thereby…

New Phishing Attack that Hides Malicious Link from Outlook Users

A sophisticated phishing technique that exploits Microsoft Outlook‘s HTML rendering capabilities to hide malicious links from corporate security systems while maintaining their effectiveness against end users.  The attack leverages conditional HTML statements to display different content depending on whether the…

35,000 Solar Power Systems Exposed To Internet Are Vulnerable To Cyberattacks

A comprehensive cybersecurity investigation has revealed alarming vulnerabilities in the rapidly expanding solar energy infrastructure, with nearly 35,000 solar power devices found exposed to internet-based attacks across 42 vendors worldwide. The discovery underscores growing security concerns as renewable energy systems…

New Malware Attack Deploys Malicious Chrome & Edge Extensions To Steal Sensitive Data

Cybersecurity researchers have uncovered a sophisticated malware campaign targeting Brazilian users through malicious browser extensions designed to steal sensitive banking credentials and financial data. The operation, dubbed “Operation Phantom Enigma,” represents a significant escalation in banking trojans’ evolution, utilizing browser…

New Crocodilus Malware That Gain Complete Control of Android Device

A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that grant cybercriminals unprecedented control over infected smartphones. First discovered in March 2025, this malware has rapidly evolved from localized test…

Business Email Compromise Attacks: How To Detect Them Early

Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake login prompt, a cleverly disguised link, and an employee’s credentials are gone. From there, attackers can quietly access inboxes, exfiltrate…

Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign that weaponizes users’ trust in routine internet verification processes to deliver malicious payloads. The scheme exploits familiar “prove you are human” prompts, transforming seemingly innocent website interactions into vectors for malware distribution…

Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups

Aembit, the workload identity and access management (IAM) company, today announced its inclusion in Rising in Cyber 2025, an independent list launched by Notable Capital to spotlight the 30 most promising cybersecurity startups shaping the future of security. Unlike traditional rankings,…