CISA issued a critical alert regarding a code-injection vulnerability in Microsoft PowerPoint that poses a significant risk to organizations worldwide. The vulnerability, tracked as CVE-2009-0556, allows remote attackers to execute arbitrary code by crafting malicious PowerPoint files. Potentially compromising system…
Tag: Cyber Security News
Researches Detailed AuraStealer Obfuscation, Anti-Analysis and Data Theft Capabilities
AuraStealer has emerged as a dangerous malware-as-a-service targeting Windows systems from Windows 7 to Windows 11. This infostealer spreads primarily through Scam-Yourself campaigns on platforms like TikTok, where victims encounter tutorial videos promoting free activation of paid software. The malware…
Cisco ISE Vulnerability Let Remote attacker Access Sensitive Data – Public PoC Available
Cisco has patched a critical flaw in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that lets authenticated administrators snoop on sensitive server files. Dubbed CVE-2026-20029, the vulnerability stems from a flaw in XML parsing in the…
China Hacked Email Systems Used by US Congressional Staff, New Report
A sophisticated Chinese hacking group has breached email systems accessed by staffers on critical U.S. House committees, exposing sensitive communications amid escalating cyber tensions between Washington and Beijing. The Financial Times revealed on Wednesday that the intruders, tracked as Salt…
Linux Battery Utility Flaw Lets Hackers Bypass Authentication and Tamper System Settings
A critical security vulnerability has been discovered in TLP, a widely used Linux laptop battery optimization utility, allowing local attackers to bypass authentication controls and manipulate system power settings without authorization. Security researchers from openSUSE identified a severe authentication bypass…
GitLab Patches Multiple Vulnerabilities that Enables Arbitrary Code Execution
GitLab has released emergency security patches for multiple versions of its platform, addressing eight vulnerabilities that could enable arbitrary code execution and unauthorized access in self-managed installations. The updated versions 18.7.1, 18.6.3, and 18.5.5 were deployed to GitLab.com on January…
Top 3 Cyber Attacks In March 2026
March 2026 delivered a surge in cyber threats targeting users and organizations alike from banking apps hijacked to siphon personal data, to trusted domains exploited for phishing redirects. Cybercriminals unleashed increasingly cunning and perilous tactics. Here’s a breakdown of the…
10 Best IT Asset Management Tools In 2026
IT asset management (ITAM) software has become indispensable for businesses seeking to track, manage, and optimize their hardware, software, and cloud resources efficiently. As 2026 approaches, ITAM tools are evolving rapidly with cutting-edge features that cut costs, bolster security, ensure…
Top 10 Best Server Monitoring Tools in 2026
Server monitoring tools keep IT infrastructure running smoothly by delivering real-time visibility into key metrics like CPU load, memory usage, disk capacity, and network throughput. Standouts include Zabbix for its scalability and customization, Nagios with vast plugin ecosystems for tailored…
10 Best Web Scanners for Website Security In 2026
Securing websites demands top-tier web vulnerability scanners. These powerful tools pinpoint critical flaws like SQL injection, cross-site scripting (XSS), and command injection, keeping your site fortified against attacks. Elite scanners emulate attacker strategies, delivering concrete proof and precise fix instructions.…
Top 50 Best Penetration Testing Companies in 2026
Penetration testing companies serve as vital cybersecurity allies, simulating real-world cyberattacks to expose vulnerabilities in systems, networks, and applications before malicious actors strike. Employing ethical hackers with advanced techniques, they rigorously assess defenses, pinpoint misconfigurations, and evaluate control effectiveness to…
Three Malicious NPM Packages Attacking Developers to Steal Login Credentials
Three malicious npm packages are targeting JavaScript developers to steal browser logins, API keys, and cryptocurrency wallet data. The packages, named bitcoin-main-lib, bitcoin-lib-js, and bip40, were uploaded to the public npm registry and posed as tools linked to the popular…
Ni8mare Vulnerability Let Attackers Hijack n8n Servers – Exploit Released With 26,512 Vulnerable Hosts
A critical unauthenticated remote code execution vulnerability discovered in n8n, the popular workflow automation platform, exposes an estimated 100,000 servers globally to complete takeover. Tracked as CVE-2026-21858 with a maximum CVSS score of 10.0, the flaw allows unauthenticated attackers to…
Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
Hackers are exploiting VMware ESXi instances in the wild with a zero-day exploit toolkit that chains multiple vulnerabilities for VM escapes. Cybersecurity firm Huntress disrupted one such attack, attributing initial access to a compromised SonicWall VPN. Threat actors gained a…
Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
A recent phishing campaign is abusing QR codes in a new way, turning simple HTML tables into working codes that redirect users to malicious sites. Instead of embedding a QR image in the email body, the attackers build the code…
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families
A sophisticated Windows packer known as pkr_mtsi has emerged as a powerful tool for delivering multiple malware families through widespread malvertising campaigns. First detected on April 24, 2025, this malicious packer continues to operate actively, distributing trojanized installers disguised as…
From Tycoon2FA to Lazarus Group – Inside ANY.RUN’s Biggest Discoveries of 2025
ANY.RUN, the interactive malware analysis platform, has wrapped up 2025 with impressive growth figures and significant contributions to the cybersecurity community. The company’s annual report reveals how its global user base collectively spent over 400,000 hours analyzing threats—equivalent to more…
GoBruteforcer Botnet brute-forces Passwords for FTP, MySQL, and phpMyAdmin on Linux Servers
A sophisticated Go-based botnet dubbed GoBruteforcer is aggressively targeting Linux servers worldwide, brute-forcing weak passwords on internet-exposed services including FTP, MySQL, PostgreSQL, and phpMyAdmin. Check Point Research recently documented a new 2025 variant of the malware that demonstrates significant technical…
CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques
CrazyHunter ransomware has emerged as a critical and evolving threat that specifically targets healthcare organizations and sensitive medical infrastructure. This Go-developed malware represents a significant escalation in ransomware sophistication, employing advanced encryption methods and delivery mechanisms designed to bypass modern…
ownCloud Urges Users to Enable Multi-Factor Authentication Following Credential Theft
ownCloud has urgently urged users of its Community Edition to enable multi-factor authentication (MFA). Threat intelligence report from Hudson Rock highlighted incidents where attackers compromised self-hosted file-sharing platforms, including some ownCloud deployments, but ownCloud stresses that its platform itself remains…