Two high-severity vulnerabilities (CVE-2025-24916, CVE-2025-24917) in Tenable Network Monitor solution, enabling local privilege escalation on Windows systems through insecure directory permissions and arbitrary code execution. The security flaws affect all versions prior to 6.5.1 and have been assigned high severity…
Tag: Cyber Security News
Fake DigiYatra Apps Attacking Indian Users to Steal Financial Data
A sophisticated phishing campaign targeting Indian air travelers has emerged, exploiting the trusted DigiYatra brand to harvest sensitive personal and financial information from unsuspecting users. The malicious operation centers around a deceptive website at digiyatra[.]in that masquerades as the official…
Bitwarden PDF File Handler Vulnerability Let Attackers Upload Malicious PDF Files
A critical cross-site scripting (XSS) vulnerability has been discovered in the popular password manager Bitwarden, affecting versions up to 2.25.1. The security flaw, designated as CVE-2025-5138, resides in the PDF File Handler component and allows attackers to upload malicious PDF…
60 Malicious npm Packages Exfiltrates Exfiltrate Hostnames, IP’s, DNS Servers Details
A sophisticated malware campaign targeting the npm ecosystem has compromised developer environments through 60 malicious packages designed to silently harvest sensitive network information. The operation, which began eleven days ago and remains active as of publication, demonstrates the growing threat…
Street-Level QR Phishing: Cybercriminals Take Social Engineering to the Real World
A disturbing new trend in cybercrime emerged this week as security professionals discovered QR codes taped to lampposts in what appears to be a sophisticated psychological manipulation campaign. The handwritten note, which read “John, I know you are cheating on…
Threat Actors Installing DB Client Tools on Targeted Systems to Exfiltrate Sensitive Data
Cybersecurity researchers have uncovered a concerning trend where threat actors are increasingly leveraging legitimate database client tools to steal sensitive information from compromised systems. This sophisticated approach represents a significant evolution in data exfiltration techniques, as attackers exploit trusted applications…
40+ Malicious Chrome Extensions Mimic as Popular Chrome Brands Steals Sensitive Data
Cybersecurity researchers have uncovered a sophisticated campaign involving over 40 malicious Chrome browser extensions that masquerade as trusted brands to steal sensitive user data. The malicious extensions, which remain active on the Google Chrome Store, represent a significant escalation in…
Oracle TNS Protocol Vulnerability Let Attackers Access System Memory Contents
A critical vulnerability in Oracle’s Transparent Network Substrate (TNS) protocol that allows unauthenticated attackers to access sensitive system memory contents, including environment variables and connection data. Oracle assigned CVE-2025-30733 to this vulnerability and released patches on April 15, 2025. The…
Apache Tomcat Vulnerability Allows Remote Code Execution – PoC Released
A critical path equivalence vulnerability in Apache Tomcat, designated CVE-2025-24813, has been actively exploited in the wild following the public release of proof-of-concept exploit code. The vulnerability, disclosed on March 10, 2025, enables unauthenticated remote code execution under specific server…
Sophisticated Hacker Group TA-ShadowCricket Attacking Government & Enterprise Networks
A sophisticated China-linked threat actor known as TA-ShadowCricket has been conducting stealthy cyber espionage operations against government and enterprise networks across the Asia-Pacific region for over a decade. The group, formerly identified as Shadow Force and initially categorized as Larva-24013…
GNOME RDP Vulnerability Let Attackers Exhaust System Resources & Crash Process
A severe security vulnerability affecting GNOME Remote Desktop has been discovered, allowing unauthenticated attackers to exhaust system resources and crash critical processes. CVE-2025-5024, disclosed on May 21, 2025, poses significant risks to organizations utilizing remote desktop services across Red Hat…
Critical WSO2 SOAP Vulnerability Let Attackers Reset Password for Any User Account
A critical security vulnerability in multiple WSO2 products has been discovered that allows attackers to reset passwords for any user account, potentially leading to complete system compromise. CVE-2024-6914, published on May 22, 2025, represents a severe threat to organizations using…
Linux 6.15 Released with Several New Features & Improvements
Linus Torvalds officially announced the stable release of the Linux kernel 6.15 on May 25, 2025. This release marked a significant milestone in open-source development, with groundbreaking Rust integration, substantial performance improvements, and extensive hardware support expansion. This release introduces…
GitLab Duo Vulnerability Let Attack Inject Malicious link & Steal Source Code
A critical remote prompt injection vulnerability was uncovered in GitLab Duo, the AI-powered coding assistant integrated into GitLab’s DevSecOps platform. The vulnerability, disclosed in February 2025, allowed attackers to manipulate the AI assistant into leaking private source code and injecting…
184 Million Users’ Passwords Exposed From an Open Directory Controlled by Hackers
A massive cybersecurity breach has exposed 184 million login credentials in an unprotected database, marking one of the largest credential exposures discovered in recent years. Cybersecurity researcher Jeremiah Fowler uncovered the non-encrypted database containing 184,162,718 unique usernames and passwords totaling…
.Net Based Chihuahua Infostealer Exploit Google Drive Steals Browser Credentials and Crypto Wallets
A new .NET-based malware, dubbed Chihuahua Infostealer, has emerged as a significant threat to cybersecurity, targeting sensitive browser credentials and cryptocurrency wallet data. Discovered in April 2025, this multi-stage malware employs obfuscated PowerShell scripts and trusted cloud platforms like Google…
Russian Cybercriminal Charged in $24 Million Qakbot Ransomware Scheme
The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov, 48, for allegedly orchestrating one of the world’s most sophisticated malware operations that infected over 700,000 computers globally and facilitated devastating ransomware attacks. The Moscow-based…
GenAI Assistant DIANNA Uncovering New Obfuscated Malware
The cybersecurity landscape witnessed a significant milestone this February with the emergence of BypassERWDirectSyscallShellcodeLoader, a sophisticated malware specimen that represents the first documented case of large language model-generated malicious code being analyzed by an artificial intelligence security assistant. This groundbreaking…
Threat Actor Selling Burger King Backup System RCE Vulnerability for $4,000
A cybersecurity threat has emerged targeting one of the world’s largest fast-food chains, as a threat actor known as #LongNight has put up for sale remote code execution (RCE) access to Burger King Spain’s backup infrastructure for $4,000. The vulnerability…
Bypassing Zero-Trust Policies to Exploit Vulnerabilities & Manipulate NHI Secrets
A comprehensive security research demonstration has revealed how attackers can systematically undermine modern zero-trust security frameworks by exploiting a critical DNS vulnerability to disrupt automated secret rotation mechanisms. The research showcases a sophisticated attack chain that begins with crashing DNS…