Canonical, the company behind Ubuntu, has announced that Ubuntu is now available on Microsoft’s new tar-based distribution architecture for Windows Subsystem for Linux (WSL). This development marks a significant shift in how Linux distributions can be deployed and managed within…
Tag: Cyber Security News
Weaponizing Windows Background Images to Gain Admin Access Using AnyDesk Vulnerability
A recently disclosed vulnerability in AnyDesk, a widely used remote desktop software, has raised significant cybersecurity concerns. The vulnerability identified by CVE-2024-12754 and tracked by ZDI-24-1711 allows local attackers to exploit the handling of Windows background images to gain unauthorized…
Password Stealing Malware Attacking macOS Users Increasing Rapidly
In recent months, macOS users have faced a significant rise in password-stealing malware attacks. These threats, often distributed through malicious advertising and fake application installers, have become increasingly sophisticated. Three prominent malware types, “Atomic Stealer,” “Poseidon Stealer,” and “Cthulhu Stealer”…
Critical Cisco ISE Vulnerabilities Allow Arbitrary Command Execution Remotely
Cisco has disclosed two critical vulnerabilities in its Identity Services Engine (ISE) software that could allow authenticated, remote attackers to execute arbitrary commands, elevate privileges, and manipulate system configurations on affected devices. These vulnerabilities tracked as CVE-2025-20124 and CVE-2025-20125, have…
New Malware Attacking Users of Indian Banks To Steal Aadhar, PAN, ATM & Credit Card PINs
A recent cybersecurity threat has emerged in India, targeting users of various Indian banks with a sophisticated malware campaign. This campaign, discovered by the zLabs research team, involves nearly 900 malware samples designed to steal sensitive financial and personal data,…
242,000 Times Downloaded Malicious Apps from Android and iOS Stealing Crypto Keys
In a shocking revelation, researchers have uncovered a widespread malware campaign targeting both Android and iOS users. Dubbed “SparkCat,” this malicious operation involves apps embedded with a malicious SDK designed to steal recovery phrases for cryptocurrency wallets. The infected apps,…
BADBOX Botnet Infected Over 190,000 Android Devices Including LED TVs
A newly discovered botnet named BADBOX has been found to have infected over 190,000 Android devices, including high-end models like Yandex 4K QLED TVs. This botnet is particularly concerning due to its ability to infect devices potentially through pre-installed malware…
242,000 Times Downloaded Malicious Apps from Android and iOS Stealing Crypto Recovery Keys
In a shocking revelation, researchers have uncovered a widespread malware campaign targeting both Android and iOS users. Dubbed “SparkCat,” this malicious operation involves apps embedded with a malicious SDK designed to steal recovery phrases for cryptocurrency wallets. The infected apps,…
Hackers Using AI Agents To Validate Stolen Credit Cards
Hackers have begun leveraging AI agents to validate stolen credit cards, marking a new era in the sophistication of financial fraud. This trend highlights the evolving threat landscape where technology, once seen as a tool for security, is being repurposed…
CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel vulnerability, CVE-2024-53104, to its Known Exploited Vulnerabilities (KEV) Catalog, emphasizing its potential impact on systems worldwide. This vulnerability, classified as an out-of-bounds write issue, affects the USB…
Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks
The AI startup DeepSeek has gained significant attention in recent weeks for its advanced AI models, particularly the R1 reasoning model. However, this rapid rise to fame has also attracted the unwanted attention of cybercriminals, who are exploiting DeepSeek’s popularity…
Multiple IBM Cloud Pak Vulnerabilities Let Attackers Execute Remote Code
IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software. These vulnerabilities, if exploited, could allow attackers to access sensitive data, disrupt operations, or compromise system integrity. The fixes are part of the…
Apple’s macOS Kernel Vulnerability Let Attackers Escalate Privileges – PoC Released
A critical vulnerability in Apple’s macOS kernel (XNU), tracked as CVE-2025-24118, has been disclosed, potentially allowing attackers to escalate privileges, corrupt memory, and even execute kernel-level code. The flaw, affecting macOS Sonoma versions earlier than 14.7.3, macOS Sequoia versions earlier…
Critical Netgear Vulnerabilities Let Attackers Execute Remote Code
NETGEAR has issued a critical security advisory addressing a severe unauthenticated remote code execution (RCE) vulnerability affecting several of its popular router models. This flaw, tracked under internal identifier PSV-2023-0039, poses a significant risk by allowing attackers to execute arbitrary…
Hackers Exploit GPU Vulnerabilities to Take Complete Control of Your Device
Significant vulnerabilities in GPU drivers, particularly those affecting ARM Mali GPUs, have been found to enable hackers to gain complete control over devices. These vulnerabilities, identified as CVE-2022-22706 and CVE-2021-39793, exploit flaws in the Mali GPU Kernel Driver, which is…
Threat Actors Leveraging Free Email Services To Attack Govt & Education Entities
In recent years, threat actors have increasingly targeted free email services to compromise government and educational entities. One such group, known as GreenSpot, has been particularly active in this domain. GreenSpot, believed to operate from Taiwan, has been involved in…
CISA Releases Nine Advisories Detailing Vulnerabilities and Exploits Surrounding ICS
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued nine new Industrial Control Systems (ICS) advisories, shedding light on critical vulnerabilities and exploits that could significantly impact industrial operations. These advisories aim to provide actionable insights for securing ICS…
Hackers Exploits ADFS to Bypass MFA & Gain Access to Critical Systems
A sophisticated phishing campaign has been discovered targeting organizations reliant on Microsoft’s Active Directory Federation Services (ADFS). This legacy single sign-on (SSO) solution, designed to streamline authentication across multiple applications, is being exploited by attackers to bypass multi-factor authentication (MFA)…
CISA Releases Guidance to Protect Firewalls, Routers, & Internet-Facing Servers
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international cybersecurity authorities, has issued comprehensive guidance aimed at securing network edge devices. These devices, which include firewalls, routers, VPN gateways, Internet of Things (IoT) devices, internet-facing servers, and operational…
Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam backup solutions. This flaw enables attackers to execute arbitrary code on affected servers through a Man-in-the-Middle (MitM) attack, potentially granting…