Tag: Cyber Security News

US Army Soldier Arrested for Hacking 15 Telecom Carriers

U.S. Army Specialist Cameron John Wagenius, 21, is charged with federal offenses for allegedly hacking at least 15 telecom companies and trying to extort a major provider while leveraging stolen call detail records (CDRs) of high-ranking officials. The U.S. Department…

New Vulnerability in Substack let Attackers Take Over Subdomains

A newly disclosed edge case in Substack’s custom domain implementation allows threat actors to hijack inactive subdomains, potentially enabling content spoofing, phishing campaigns, and brand impersonation.  The researcher identified 1,426 vulnerable domains – representing 8% of all Substack-associated custom domains…

Vidar & StealC 2.0 Released by Threat Actors With a Complete New Build

Threat actors have simultaneously released major updates for two prominent info-stealers, Vidar and StealC, marking their transition to version 2.0.  These updates, announced in late February 2025, introduce redesigned builds, modernized features, and enhanced capabilities.  However, cybersecurity experts have uncovered…

Trigon – A New Exploit Revealed for iOS 0-Day kernel Vulnerability

Security researchers have released a sophisticated new kernel exploit targeting Apple iOS devices, dubbed Trigon, which leverages a critical vulnerability in the XNU kernel’s virtual memory subsystem.  The exploit, linked to the ith “Operation Triangulation” spyware campaign that first weaponized…

Microsoft to shut down Skype, Here is the Deadline

Microsoft has confirmed that Skype will be permanently retired on May 5, 2025. The move underscores the company’s strategic shift toward consolidating its consumer communication tools under Microsoft Teams, a unified platform designed to bridge personal, educational, and professional collaboration.…

New Pass-the-Cookie Attack Bypass Microsoft 365 & YouTube MFA Logins

A surge in “Pass-the-Cookie” (PTC) attacks is undermining multi-factor authentication (MFA), enabling cybercriminals to hijack session cookies and bypass security measures to access sensitive accounts. Recent advisories from the FBI and cybersecurity firms highlight how attackers exploit stolen browser cookies…

Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications

Security researchers have uncovered a new campaign leveraging the Njrat remote access trojan (RAT) to abuse Microsoft’s developer-oriented Dev Tunnels service for covert command-and-control (C2) communications.  Historically associated with credential theft and USB-based propagation, the malware now utilizes Microsoft’s infrastructure…