Tag: Cyber Security News

New Stego Campaign Leverages MS Office Vulnerability to Deliver AsyncRAT

Cybersecurity researchers have discovered a sophisticated malware campaign that employs steganography techniques to hide malicious code within seemingly innocent image files. This attack chain leverages an older Microsoft Office vulnerability (CVE-2017-0199) to ultimately deliver AsyncRAT, a remote access trojan capable…

ToyMaker Hackers Compromised Multitude Hosts Using SSH & File Transfer Tools

In 2023, cybersecurity experts uncovered an extensive compromise in critical infrastructure enterprises by a sophisticated threat actor group. This initial access broker, dubbed “ToyMaker,” systematically exploited vulnerable internet-facing systems before deploying custom backdoors to extract credentials from victim organizations. Their…

Citrix NetScaler Console Vulnerability Enables Admin Access – PoC Released

A critical vulnerability in Citrix NetScaler Console allows complete unauthenticated administrative access despite being initially classified as merely a “sensitive information disclosure” issue.  The proof-of-concept exploit code has been released, enabling attackers to create administrator accounts by exploiting an internal…

NVIDIA NeMo Framework Vulnerability Let Attackers Execute Remote Code

There are three high-severity vulnerabilities in the NVIDIA NeMo Framework that could allow attackers to execute remote code, potentially compromising AI systems and leading to data tampering.  The security flaws, identified as CVE-2025-23249, CVE-2025-23250, and CVE-2025-23251, each received a CVSS…

Commvault RCE Vulnerability Let Attackers Breach Vault – PoC Released

A critical pre-authenticated Remote Code Execution (RCE) vulnerability affecting Commvault’s backup and data protection platform.  The vulnerability, tracked as CVE-2025-34028, could allow attackers to compromise enterprise backup systems without requiring authentication, potentially putting organizations’ most critical data at risk. The…

Blue Shield Leaked Health Info of 4.7M patients with Google Ads

Blue Shield of California has disclosed a significant data breach affecting 4.7 million members, representing the majority of its nearly 6 million customers.  The health insurance provider revealed that protected health information (PHI) was inadvertently shared with Google’s advertising platforms…

SonicWall SSLVPN Vulnerability Let Remote Attackers Crash Firewall Appliances

SonicWall has disclosed a critical security vulnerability in its SSLVPN service that allows unauthenticated remote attackers to crash affected firewall appliances, potentially causing significant disruptions to enterprise networks.  The vulnerability, tracked as CVE-2025-32818, received a high severity CVSS score of…

Microsoft to Offer Rewards Up to $30,000 for AI Vulnerabilities

Microsoft has launched an expanded bug bounty program offering rewards of up to $30,000 for researchers who identify critical vulnerabilities in AI systems within its Dynamics 365 and Power Platform products.  The initiative, announced by Microsoft Security Response, aims to…

Building a Cyber-Aware Culture – CISO’s Step-by-Step Plan

A cyber-aware culture is the backbone of any resilient organization in today’s digital world. As cyber threats become more advanced and frequent, safeguarding sensitive data and systems can no longer rest solely with IT departments. Chief Information Security Officers (CISOs)…

FireEye EDR Agent Vulnerability Let Attackers Inject Malicious Code

A significant vulnerability in the FireEye Endpoint Detection and Response (EDR) agent that could allow attackers to inject malicious code and render critical security protections ineffective. The vulnerability, tracked as CVE-2025-0618, was disclosed today and highlights the ongoing challenges in…

Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds

Significant vulnerabilities in popular browser-based cryptocurrency wallets enable attackers to steal funds without any user interaction or approval.  These critical flaws, discovered in wallets including Stellar Freighter, Frontier Wallet, and Coin98, represent a significant shift in attack vectors against crypto…

Synology Network File System Vulnerability Let Read Any File

A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vulnerability allows remote attackers to read arbitrary files through the Network File System (NFS) service without proper authorization.  The vulnerability, tracked as CVE-2025-1021 and detailed in…

Hackers Weaponized Google Forms to Evade Email Security & Steal Logins

Google Forms, the tech giant’s widely used survey tool, has become a favored weapon in cybercriminals’ arsenal. It enables them to bypass sophisticated email security filters and harvest sensitive credentials.  Security researchers have identified a surge in attacks that leverage…

How Script-based Malware Attacks Work: Modern Examples

Script-based malware is malicious software written in scripting languages like JavaScript, Python, PowerShell, or VBScript. Unlike traditional malware that relies on compiled executables, script-based malware leverages scripts that execute as human-readable code interpreted at runtime  Scripts have become increasingly popular…

Hackers Exploiting Microsoft 365 OAuth Workflows to Target Organizations

A new campaign by Russian threat actors. These actors are exploiting legitimate Microsoft OAuth 2.0 authentication workflows to compromise targeted organizations. Since early March 2025, these sophisticated attacks have primarily focused on individuals and organizations with ties to Ukraine and…

New Malware Hijacking Docker Images with Unique Obfuscation Technique

A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique to evade detection and hijack compute resources for cryptojacking. Security researchers from Darktrace and Cado Security Labs have analyzed this campaign, revealing both the technical…

Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents

Security researchers at Fortinet’s FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized Microsoft Word documents to deliver information-stealing malware to unsuspecting Windows users. The attack exploits a well-known vulnerability to deploy FormBook, a dangerous malware variant designed…

CISA Releases Five Advisories Covering ICS Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released five new advisories addressing critical vulnerabilities in Industrial Control Systems (ICS) from Siemens, Schneider Electric, and ABB.  These advisories, published on April 22, 2025, provide detailed information on security flaws, associated…

ChatGPT Creates Working Exploit for CVEs Before Public PoCs Released

In a development that could transform vulnerability research, security researcher Matt Keeley demonstrated how artificial intelligence can now create working exploits for critical vulnerabilities before public proof-of-concept (PoC) exploits are available. Keeley used GPT-4 to develop a functional exploit for…

New Cookie-Bite Attack Let Hackers Bypass MFA & Maintain Access to Cloud Servers

A sophisticated attack technique dubbed “Cookie-Bite” enables cybercriminals to silently bypass multi-factor authentication (MFA) and maintain persistent access to cloud environments. Varonis Threat Labs revealed that attackers leverage stolen browser cookies to impersonate legitimate users without requiring credentials, effectively rendering…

Google Cloud Composer Vulnerability Let Attackers Elevate Their Privileges

A critical privilege-escalation vulnerability in Google Cloud Platform (GCP), dubbed “ConfusedComposer,” could have allowed attackers to gain elevated permissions to sensitive cloud resources.  The vulnerability, now patched, enabled attackers with minimal permissions to potentially gain control over a highly privileged…

ChatGPT Creates Working Exploit for CVE’s Before Public PoCs Released

In a development that could transform vulnerability research, security researcher Matt Keeley demonstrated how artificial intelligence can now create working exploits for critical vulnerabilities before public proof-of-concept (PoC) exploits are available. Keeley used GPT-4 to develop a functional exploit for…

How to Secure the Extended Enterprise – CISO Insights on Third-Party Risk

Modern organizations rely on a sprawling network of third-party vendors, suppliers, and partners to drive innovation and operational efficiency. However, this interconnected ecosystem introduces significant cybersecurity risks. As attack surfaces expand, malicious actors increasingly target weaker links in the supply…

Hackers Abuse Cloudflare Tunnel Infrastructure to Deliver Multiple RATs

Cybersecurity experts have identified a sophisticated attack campaign exploiting Cloudflare’s tunnel infrastructure to distribute various remote access trojans (RATs). The infrastructure, which has demonstrated remarkable resilience since February 2024, serves as a distribution platform for malicious files and trojans that…

New Magecart Attack With Malicious JavaScript Steals Credit Card Data

A sophisticated Magecart attack campaign has been discovered targeting e-commerce platforms, employing heavily obfuscated JavaScript code to harvest sensitive payment information. This latest variant of Magecart skimming attacks exhibits advanced techniques for evading detection while seamlessly capturing credit card details…

FBI Warns of Scammers Mimic as IC3 Employees to Defraud Individuals

The Federal Bureau of Investigation (FBI) has issued an urgent warning about a sophisticated phishing campaign where cybercriminals impersonate Internet Crime Complaint Center (IC3) employees to defraud individuals. This new threat emerged in early April 2025, targeting victims through convincing…

Security Metrics Every CISO Needs to Report to the Board in 2025

In today’s rapidly evolving digital landscape, cybersecurity is no longer just a technical concern; it’s a strategic business priority. As organizations become more interconnected and cyber threats grow in complexity, boards of directors demand greater transparency and accountability from their…

Malicious npm and PyPI Pose as Developer Tools to Steal Login Credentials

In a concerning development for the open-source community, several malicious packages on npm and PyPI repositories have been discovered posing as legitimate developer tools while secretly harvesting cryptocurrency wallet credentials. These packages, which have accumulated thousands of downloads collectively, demonstrate…

Strategic Cybersecurity Budgeting – CISO Best Practices

In today’s rapidly evolving threat landscape, Chief Information Security Officers (CISOs) face the challenge of securing their organizations with finite resources against virtually unlimited threats. Strategic cybersecurity budgeting has emerged as a critical leadership function beyond simple cost allocation. Effective…

Hackers Leverage Windows MS Utility Tool to Inject Malicious DLL Payload

Threat actors are increasingly exploiting mavinject.exe, a legitimate Microsoft utility, to bypass security controls and compromise systems.  This sophisticated attack technique allows hackers to hide malicious activity behind trusted Windows processes. Mavinject.exe is the Microsoft Application Virtualization Injector, designed to…

New Rust Botnet Hijacking Routers to Inject Commands Remotely

A sophisticated new botnet malware written in the Rust programming language has been discovered targeting vulnerable router devices worldwide. Dubbed “RustoBot” due to its Rust-based implementation, this malware exploits critical vulnerabilities in TOTOLINK and DrayTek router models to execute remote…

CISA Warns Threat Hunting Staff to Stop Using Censys & VirusTotal

Hundreds of Cybersecurity and Infrastructure Security Agency (CISA) staff were notified this week that the organization is discontinuing critical cybersecurity tools used for threat hunting operations. Amid broader reductions across the cyber defense agency, CISA’s threat hunting division plans to…

Why CISOs Are Betting Big on AI, Automation & Zero Trust

CISOs are betting big on modern defenses as hybrid work, cloud migration, and advanced threats make traditional security frameworks obsolete. Ransomware, phishing, and AI-powered attacks now threaten data integrity and organizational survival. With global cybercrime costs projected to exceed $10…

Patching Vulnerabilities Faster Reduces Risks & Lower Cyber Risk Index

A significant correlation between vulnerability patching speed and reduced cybersecurity risks has emerged according to groundbreaking research released on March 25, 2025. Organizations implementing rapid patching protocols experienced a measurable decrease in their Cyber Risk Index (CRI), demonstrating the critical…

Bridging the Gap – CISOs and CIOs Driving Tech-Driven Security

In today’s hyper-connected business landscape, the convergence of technology and security has never been more critical. As organizations accelerate digital transformation, the roles of Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) have become increasingly intertwined. CISOs are…

The Psychology of Social Engineering – What Security Leaders Should Know

The Psychology of Social engineering is a persistent cybersecurity threat because it exploits the most unpredictable element: human behavior. Unlike technical exploits that attack system vulnerabilities, social engineering bypasses sophisticated defenses by manipulating people into breaking standard security procedures. Understanding…

WinZip MotW Bypass Vulnerability Let Hackers Execute Malicious Code Silently

Cybersecurity researchers have discovered a critical vulnerability in WinZip that enables attackers to bypass Windows’ Mark-of-the-Web (MotW) security feature, potentially allowing malicious code to execute without warning on victims’ computers. This serious security flaw, tracked as CVE-2025-33028, affects WinZip installations…

Attack Via Infostealers Increased by 84% Via Phishing Emails Per Week

Cybersecurity researchers have documented an alarming surge in infostealer malware distribution through phishing channels, with weekly delivery volume increasing by 84% in 2024 compared to the previous year. According to recently released data, this upward trend shows no signs of…

Penetration Testing And Threat Hunting: Key Practices For Security Leaders

In today’s cybersecurity landscape, organizations face increasingly sophisticated attacks from adversaries ranging from opportunistic hackers to state-sponsored threat actors. With a significant percentage of organizations having experienced an exploit or breach, security leaders must adopt proactive approaches to identify vulnerabilities…

Building SOAR Playbooks To Respond To Common Web-Based Attacks

Web-based attacks remain one of the most persistent threats to modern organizations, targeting everything from web applications and APIs to user email inboxes. Security Orchestration, Automation, and Response (SOAR) platforms have emerged as essential tools for automating the detection, investigation,…

Digital Forensics In 2025: How CSOs Can Lead Effective Investigations

In 2025, digital forensics stands at the intersection of rapid technological innovation, increasingly sophisticated cyber threats, and the ever-expanding volume of digital data. The role of the Chief Security Officer (CSO) has never been more critical in leading effective digital…

Business Continuity in a Digital World – CISO Perspectives

In today’s interconnected business environment, digital disruptions can quickly escalate from minor technical incidents to major organizational crises. The role of Chief Information Security Officers (CISOs) has become increasingly central to business continuity planning, as organizations face sophisticated cyber threats,…

Cybersecurity Metrics That Matter for Board-Level Reporting

In today’s digital-first business environment, cyber threats are not just an IT problem they’re a core business risk. Board members are increasingly expected to oversee cybersecurity strategy, but they often lack the technical background to interpret traditional security reports. This…

Protecting Against Insider Threats – Strategies for CISOs

In the modern enterprise, cybersecurity is no longer just a technical concern it is a boardroom priority. The frequency and impact of cyber incidents have escalated, placing organizational resilience, regulatory compliance, and business reputation at risk. Board members, however, often…

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver malicious HTML content to unsuspecting victims. This emerging threat, first observed at the beginning of 2025, represents a notable evolution…

28-Year-Old Lost 2 Lakhs by Just Downloading Image in WhatsApp

A 28-year-old man from Maharashtra became the latest victim of a sophisticated WhatsApp scam. Pradeep Jain, unsuspecting and going about his daily routine, lost over Rs 2 lakh from his bank account—all because he downloaded a single image sent by an…

Windows Defender Policies Bypassed Using WinDbg Preview via Microsoft Store

A significant vulnerability in Windows Defender Application Control (WDAC) implementations, demonstrating how attackers can circumvent strict security policies through Microsoft’s own debugging tool.  The exploit leverages WinDbg Preview, available through the Microsoft Store, to inject malicious code into legitimate processes,…

Threat Actors Allegedly Selling Baldwin Killer That Bypasses AV & EDR

A sophisticated malware tool dubbed “Baldwin Killer” is reportedly being marketed on underground forums as a powerful solution for bypassing antivirus (AV) and endpoint detection and response (EDR) security products.  Security researchers have identified a forum listing offering this tool…

Bypassing AVs and EDRs With New Command-Line Obfuscation Technique

Researchers have uncovered advanced command-line obfuscation methods that allow attackers to bypass detection systems such as antivirus (AV) and endpoint detection and response (EDR) platforms.  The techniques, detailed in a comprehensive study released on March 24, 2025, exploit parsing inconsistencies…

Hackers Leverage Zoom’s Remote Control Feature to Gain Users’ System Access

A sophisticated attack campaign by threat actor ELUSIVE COMET that exploits Zoom’s legitimate remote control feature to gain unauthorized access to victims’ computers.  The attackers have successfully targeted cryptocurrency professionals using a combination of social engineering and interface manipulation techniques,…

Zero Trust Architecture – A Step-by-Step Guide for CISOs

Zero Trust Architecture (ZTA) has emerged as a critical security framework for organizations facing sophisticated threats from both external and internal vectors. In today’s rapidly evolving digital landscape, traditional security perimeters have dissolved as cloud adoption accelerates and remote work…

Linux 6.15-rc3 Released With Fix for Multiple Kernel Fixes

Linus Torvalds has announced the availability of the third release candidate for Linux kernel 6.15, continuing the development cycle with a collection of incremental improvements and bug fixes across numerous subsystems.  This update brings stability enhancements while maintaining the regular…

Critical PyTorch Vulnerability Let Attackers Execute Remote Code

A critical vulnerability in PyTorch that allows attackers to execute malicious code remotely, even when using safeguards previously thought to mitigate such risks.  The vulnerability, identified as CVE-2025-32434, affects all PyTorch versions up to and including 2.5.1 and was patched…

Beware! New Malware Mimics as Cisco Webex Attacks Users in-the-wild

Cybersecurity researchers have uncovered an active malware campaign dubbed “Voldemort” that masquerades as legitimate Cisco Webex components to deploy backdoors on targeted systems. The discovery comes just days after Cisco released a security advisory for a critical vulnerability in the…

Building a Cyber Risk Appetite Statement for Your Organization

In the digital era, organizations face a relentless barrage of cyber threats that can disrupt operations, compromise sensitive data, and erode stakeholder trust. As technology becomes the backbone of business processes, the stakes for managing cyber risk have never been…

Speed­i­fy VPN ma­cOS Vulnerability Let Attackers Escalate Privilege

A significant security vulnerability, tracked as CVE-2025-25364, was discovered in Speedify VPN’s macOS application, exposing users to local privilege escalation and full system compromise.  The flaw, uncovered by SecureLayer7, resides in the privileged helper tool me.connectify.SMJobBlessHelper, which is responsible for…

Chinese Hackers Employ New Reverse SSH Tool to Attack Organizations

A sophisticated Chinese hacking group known as Billbug (also tracked as Lotus Blossom, Lotus Panda, and Bronze Elgin) has intensified its espionage campaign across Southeast Asia, employing a new custom Reverse SSH Tool to compromise high-value targets. This group, active…