A proof-of-concept (PoC) exploit for CVE-2025-38352, a critical race condition vulnerability in the Linux kernel, has been publicly released on GitHub. The vulnerability, discovered earlier this year, targets the POSIX CPU timers implementation and was previously exploited in limited, targeted…
Tag: Cyber Security News
Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins
A sophisticated new phishing campaign has emerged, leveraging the trusted infrastructure of Google Cloud services to bypass security filters and steal sensitive Microsoft 365 login credentials. By abusing legitimate workflow automation tools, threat actors are crafting convincing attacks that blend…
Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data
Chinese threat actors have launched a sophisticated campaign using NFC-enabled Android malware called Ghost Tap to intercept and steal financial information from victims worldwide. The malware operates through a deceptive distribution model, where attackers trick users into downloading seemingly legitimate…
Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs
Researchers from the Chinese Academy of Sciences and Nanyang Technological University have introduced AURA, a novel framework to safeguard proprietary knowledge graphs in GraphRAG systems against theft and private exploitation. Published on arXiv just a week ago, the paper highlights…
LockBit 5.0 Emerges with New Sophisticated Encryption and Anti-Analysis Tactics
LockBit 5.0 has surfaced as the latest iteration of one of the world’s most active ransomware-as-a-service operations, continuing a legacy of sophisticated attacks since the group’s emergence in September 2019. This new version represents a significant evolution in the threat…
TOTOLINK EX200 Extender Vulnerability Allow Attacker to Gain Full System Access
A severe vulnerability in the TOTOLINK EX200 Wi-Fi extender could allow attackers to gain full system access via an unauthenticated telnet root service, researchers warned. The flaw, tracked as CVE-2025-65606 and assigned CERT Vulnerability Note VU#295169, affects the firmware upload error-handling logic…
ToddyCat Malware Compromises Microsoft Exchange Servers using ProxyLogon Vulnerability
ToddyCat, a sophisticated cyber espionage group, has emerged as a persistent threat targeting high-profile organizations across multiple continents. The group began operations in December 2020 by compromising Microsoft Exchange servers in Taiwan and Vietnam using an unidentified vulnerability. However, their…
Microsoft to Cancel Plans Imposing Daily Limit For Exchange Online Bulk E-mails
Microsoft has announced the indefinite cancellation of its Mailbox External Recipient Rate Limit in Exchange Online, reversing a previously planned restriction on bulk email sending. The decision comes after significant customer feedback highlighting operational disruptions caused by the proposed limitation.…
Hackers Exploited Routing Scenarios and Misconfigurtions to Effectively Spoof Organizations
Phishing actors are exploiting complex routing scenarios and misconfigured security protections to send fake emails that appear to come from within organizations. These emails look like they were sent internally, making them harder to detect. Threat actors have used this…
D-Link Router Command Injection Vulnerability Actively Exploited in the Wild
D-Link has confirmed unauthenticated command injection vulnerabilities affecting multiple router models deployed internationally. Active exploitation campaigns using DNS hijacking have been documented since late 2016, with threat actors continuing malicious activities through 2019 and beyond. Multiple D-Link router models remain…
Black Cat Hacker Group with Fake Notepad++ Sites to Install Malware and Steal Data
The notorious Black Cat cybercriminal group has aggressively resurfaced with a sophisticated malware campaign utilizing advanced search engine optimization techniques to distribute counterfeit versions of popular open-source software. By manipulating search engine algorithms, the gang successfully positions meticulously crafted phishing…
Chinese Hackers Actively Attacking Taiwan Critical Infrastructure
China’s cyber army has intensified attacks against Taiwan’s critical infrastructure in 2025, marking a significant escalation in digital warfare tactics. Taiwan’s national intelligence community documented a troubling trend: approximately 2.63 million intrusion attempts per day targeted critical systems across nine…
Critical n8n Vulnerability Enables Authenticated Remote Code Execution
A severe security vulnerability has been discovered in n8n, the popular workflow automation platform, which allows authenticated users to execute arbitrary code remotely on affected instances. The flaw poses significant risks to both self-hosted deployments and n8n Cloud instances, potentially…
Top 10 Best Open Source Firewall in 2026
An open-source firewall provides network security by monitoring and controlling traffic based on predefined rules, offering transparency, flexibility, and cost savings through accessible source code that users can modify to suit specific needs. These firewalls function through essential mechanisms like…
10 Best Vulnerability Assessment and Penetration Testing (VAPT) Tools in 2026
Vulnerability Assessment and Penetration Testing (VAPT) tools form the cornerstone of any cybersecurity toolkit, enabling organizations to identify, analyze, and remediate vulnerabilities across systems, networks, applications, and IT infrastructure. These tools empower proactive security by exposing weaknesses and attack vectors…
Forcepoint DLP Vulnerability Enables Memory Manipulation and Arbitrary Code Execution
A critical security flaw in Forcepoint One DLP Client has been disclosed, allowing attackers to bypass vendor-implemented Python restrictions and execute arbitrary code on enterprise endpoints. The vulnerability, tracked as CVE-2025-14026, undermines the data loss prevention security controls designed to…
Top 10 Best Dynamic Malware Analysis Tools in 2026
Dynamic malware analysis tools execute suspicious binaries in isolated sandboxes to capture runtime behaviors file modifications, network traffic, registry changes, and persistence mechanisms. This top 10 list details each tool’s features, strengths, and limitations to guide your selection. ANY.RUN’s Interactive…
Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users
Crimson Collective, an emerging extortion group, claims to have breached U.S. fiber broadband provider Brightspeed, stealing data on over 1 million residential customers and disconnecting many from home internet service. The group posted screenshots on Telegram detailing the alleged compromise…
Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions
Google has released an urgent security update for the Chrome browser to address a high-severity vulnerability in the WebView tag component that could allow attackers to bypass critical security restrictions. Google rolled out Chrome version 143.0.7499.192/.193 for Windows and Mac,…
Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users
Two rogue Chrome extensions have compromised over 900,000 users by secretly exfiltrating ChatGPT and DeepSeek conversations, along with full browsing histories, to attacker servers. Discovered by OX Security researchers, the malware impersonates the legitimate AITOPIA AI sidebar tool, with one…