Tag: Cyber Security News

Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number

A sophisticated scam operation targeting major American companies, including Netflix, Microsoft, and Bank of America, where attackers manipulate legitimate websites to display fraudulent phone numbers.  The attack, technically classified as a search parameter injection attack, exploits vulnerabilities in website search…

2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

A sophisticated phishing campaign masquerading as official Social Security Administration (SSA) communications has successfully compromised more than 2,000 devices, according to a recent investigation. The attack, which leverages the trust associated with government correspondence, represents a concerning evolution in social…

OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data

A critical security vulnerability has been discovered in OPPO’s Clone Phone feature that could expose sensitive user data through inadequately secured WiFi hotspots.  The vulnerability, designated CVE-2025-27387, affects ColorOS 15.0.2 and earlier versions, presenting a high-severity risk with a CVSS…

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs

This comprehensive guide provides SOC analysts and MSSP teams with practical threat hunting techniques using advanced threat intelligence platforms. Modern threat actors continuously develop sophisticated evasion techniques, making traditional detection methods insufficient for comprehensive security operations. The strategies outlined here…

Steelmaker Nucor Hacked – Attackers Gained Unauthorized Access to IT Systems

Charlotte-based steel giant Nucor Corporation disclosed a significant cybersecurity incident where threat actors gained unauthorized access to the company’s information technology infrastructure.  The breach prompted temporary production shutdowns across multiple facilities as the company implemented emergency containment protocols and engaged…

Microsoft Family Safety Blocking All the Version of Chrome Browsers

Microsoft Family Safety’s recent update has triggered an unexpected system-wide blocking of Google Chrome browsers across all versions, creating significant operational challenges for educational institutions and families utilizing Windows devices with parental controls enabled. The issue, which emerged on June…

How Smart Timesheet Software Is Changing the Way of Work

As an employee have been managing projects in remote, hybrid, and traditional work environments, employees have always faced the same challenge: the inability to understand where time, actually is spent. Regular tasks are not completed on time as they are…

Microsoft Announces New Security Defaults for Windows 365 Cloud PCs

Microsoft unveiled significant security enhancements for Windows 365 Cloud PCs on June 18, 2025, introducing new default configurations that prioritize data protection and system integrity.  The updates include disabling clipboard, drive, USB, and printer redirections by default, while enabling advanced…

Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency

Cybersecurity researchers have uncovered a significant resurgence of the Prometei botnet, a sophisticated malware operation targeting Linux servers for cryptocurrency mining and credential theft. This latest campaign, observed since March 2025, demonstrates the evolving nature of cryptomining malware and its…

New TxTag Phishing Attack Leverages .gov Domain to Trick Employees

A sophisticated phishing campaign targeting employees with fake toll payment notices has been identified, combining government domain spoofing with social engineering tactics. The attackers craft messages claiming to be from TxTag, warning recipients that their accounts face suspension unless outstanding…

Jitter-Trap – A New Technique to Detect Stealthy Beacon Traffic

A new detection method called Jitter-Trap that turns cybercriminals’ own evasion tactics against them, offering new hope in the battle against sophisticated post-exploitation attacks.  Released on June 18, 2025, this technique focuses on identifying stealthy beacon communications that traditional security…

Microsoft Defender for Office 365 to Block Email Bombing Attacks

Microsoft has announced a new security capability within its Defender for Office 365 suite aimed at combating the growing threat of email bombing attacks.  The feature, officially labeled “Mail Bombing Detection,” will automatically identify and quarantine high-volume email flooding campaigns…

PLA Rapidly Deploys AI Technology Across Military Intelligence Operations

China’s People’s Liberation Army has accelerated its integration of generative artificial intelligence across military intelligence operations, marking a significant shift in how the world’s largest military force approaches data collection, analysis, and strategic decision-making. This technological transformation represents the PLA’s…