Tag: Cyber Security News

Threat Actors Abuse AI Website Creation App to Deliver Malware

Cybercriminals have discovered a new avenue for malicious activities by exploiting Lovable, an AI-powered website creation platform, to develop sophisticated phishing campaigns and malware delivery systems. The platform, designed to democratize web development through natural language prompts, has inadvertently become…

Mozilla High Severity Vulnerabilities Enables Remote Code Execution

Mozilla has released Firefox 142 to address multiple high-severity security vulnerabilities that could allow attackers to execute arbitrary code remotely on affected systems.  The security advisory, published on August 19, 2025, reveals nine distinct vulnerabilities ranging from sandbox escapes to…

Internet Archive Abused for Hosting Stealthy JScript Loader Malware

Security researchers have uncovered a novel malware delivery chain in recent weeks that leverages the Internet Archive’s legitimate infrastructure to host obfuscated payloads. The attack begins with a seemingly innocuous JScript file delivered via malspam, which in turn invokes a…

Hacker Charged in Connection with DDoS-for-Hire ‘Rapper Bot’ Scheme

Federal investigators have dismantled one of the world’s most powerful distributed denial-of-service (DDoS) botnets and charged its alleged administrator with orchestrating cyberattacks that targeted victims across more than 80 countries.  Ethan Foltz, 22, of Eugene, Oregon, faces federal charges for…

Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy

Cybersecurity researchers have uncovered a sophisticated new threat campaign that leverages a seemingly legitimate PDF editor application to transform infected devices into residential proxies. The malicious software, distributed under the guise of productivity tools, represents an evolving approach by threat…

DragonForce Ransomware Attack Analysis – Targets, TTPs and IoCs

DragonForce represents a sophisticated and rapidly evolving ransomware operation that has emerged as a significant threat in the cybersecurity landscape since late 2023. Operating under a Ransomware-as-a-Service (RaaS) model, this group has demonstrated exceptional adaptability by leveraging leaked ransomware builders…

CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits

CISA issued four comprehensive Industrial Control Systems (ICS) advisories on August 19, 2025, highlighting serious vulnerabilities affecting critical infrastructure sectors including energy and manufacturing. These advisories detail exploitable vulnerabilities with CVSS scores ranging from 5.8 to 9.8, requiring immediate attention…

New Loader Malware Dubbed ‘QuirkyLoader’ Delivering Infostealers and RATs

A sophisticated new malware loader called QuirkyLoader has emerged as a significant cybersecurity threat, actively distributing well-known infostealers and remote access trojans (RATs) since November 2024. The malware has demonstrated remarkable versatility in delivering multiple payload families, including Agent Tesla,…

New PromptFix Attack Tricks AI Browsers to Run Malicious Hidden Prompts

A new attack vector called PromptFix exploits AI-powered browsers by embedding malicious instructions within seemingly innocent web content.  The attack represents an evolution of traditional ClickFix scams, specifically designed to manipulate agentic AI systems rather than human users. The research,…

SafeLine: A Free Zero Trust Web Application Firewall for 2026

Every type of organization—whether it’s a multinational giant with thousands of employees or a single tech enthusiast running a homelab—needs a web application firewall (WAF).  The reason is straightforward: web applications face constant threats from cyber attacks that can exploit…

New Salty 2FA PhaaS Attacking Microsoft 365 Users to Steal Login Credentials

A sophisticated new Phishing-as-a-Service (PhaaS) framework dubbed “Salty 2FA” has emerged as a significant threat to Microsoft 365 users across the US and European industries. This previously undocumented platform employs advanced obfuscation techniques and multi-stage execution chains specifically designed to…

Okta Security Releases Auth0 Event Logs for Proactive Threat Detection

Okta has announced the launch of the Auth0 Customer Detection Catalog, a comprehensive open-source repository designed to enhance proactive threat detection capabilities for Auth0 customers.  This strategic release represents a significant advancement in identity and access management security, providing security…

Microsoft Office.com Suffers Major Outage, Investigation Underway

Microsoft’s comprehensive suite of online services, including the central Office.com portal, is currently experiencing a significant and widespread outage, leaving millions of users unable to access essential productivity applications. The company has confirmed the issue and is actively investigating the…

Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content

Cybercriminals are increasingly exploiting generative artificial intelligence platforms to orchestrate sophisticated phishing campaigns that pose unprecedented challenges to traditional security detection mechanisms. The rapid proliferation of GenAI services has created a fertile ecosystem for threat actors who leverage these platforms…

RingReaper Malware Attacking Linux Servers Evading EDR Solutions

A sophisticated new malware strain targeting Linux environments has emerged, demonstrating advanced evasion capabilities that challenge traditional endpoint detection and response systems. RingReaper, identified as a post-exploitation agent, leverages the Linux kernel’s modern asynchronous I/O interface to conduct covert operations…

Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets

The cybersecurity landscape continues to witness sophisticated threat actors developing increasingly complex attack methodologies to infiltrate organizational networks and steal sensitive information. A recent investigation by security researchers has uncovered a persistent campaign orchestrated by the Scaly Wolf Advanced Persistent…

Paper Werewolf Exploiting WinRAR Zero‑Day Vulnerability to Deliver Malware

Cybersecurity researchers have uncovered a sophisticated campaign by the Paper Werewolf threat actor group, also known as GOFFEE, targeting Russian organizations through the exploitation of critical vulnerabilities in WinRAR archiving software. The campaign, active since July 2025, demonstrates the group’s…

Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

A sophisticated cybercriminal operation targeting government institutions and private organizations across multiple continents has culminated in the sentencing of Al-Tahery Al-Mashriky, a 26-year-old hacker from Rotherham, South Yorkshire. The prolific attacker, who operated under multiple aliases within the extremist hacking…

New Research Unmask DPRK IT Workers Email Address and Hiring Patterns

Recent cybersecurity intelligence has exposed a sophisticated infiltration campaign orchestrated by North Korean state-sponsored threat actors, specifically the Jasper Sleet group, who have systematically penetrated Western organizations through fraudulent employment schemes. This operation, targeting primarily Web3, blockchain, and cryptocurrency companies,…

How Winning SOCs Always Stay Ahead of Threats

Despite the escalating danger of cybersecurity breaches, high-performing Security Operations Centers are able to maintain their resilience and prevent attacks. That’s what makes them essential for sustainable growth of businesses and organizations. But what enables powerful SOC teams to stay…

OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5

OpenAI has unveiled ChatGPT Go, a budget-friendly subscription plan priced at just ₹399 per month (approximately $4 USD, GST included). The announcement, made today, positions the service as an accessible entry point to cutting-edge AI capabilities, including unlimited access to…

MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data

A series of alarming vulnerabilities in McDonald’s digital infrastructure, from free food exploits to exposed executive data. What started as a simple app glitch developed into a months-long trial, culminating in the researcher, BobDaHacker, cold-calling the company’s headquarters while mentioning…

Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer

A sophisticated phishing campaign has emerged targeting enterprises with significant social media footprints, leveraging weaponized copyright infringement notices to deliver the evolved Noodlophile Stealer malware. This highly targeted threat represents a significant escalation from previous iterations, exploiting enterprises’ reliance on…

1.1 Million Users Data Exposed in Massive Allianz Life Data Breach

Allianz Life, a primary insurance provider, has fallen victim to a sophisticated social engineering attack that compromised the personal data of approximately 1.1 million customers in July 2025.  The breach, which targeted the company’s Salesforce CRM platform, represents one of…

Palo Alto Networks Founder and CTO Retires After 20-Year Tenure

Palo Alto Networks announced a significant leadership transition as founder and Chief Technology Officer Nir Zuk steps down after two decades of pioneering cybersecurity innovation.  The global cybersecurity leader has appointed longtime executive Lee Klarich as the new CTO and…

New Blue Locker Ransomware Attacking Oil & Gas Sector in Pakistan

Pakistan’s National Cyber Emergency Response Team (NCERT) has issued urgent warnings to 39 government ministries following a sophisticated ransomware campaign targeting the country’s critical infrastructure. The Blue Locker ransomware has successfully compromised Pakistan Petroleum Limited (PPL), the nation’s second-largest oil…

Threat Actors Weaponized Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers

Cybercriminals have successfully weaponized pirated gaming content to distribute sophisticated malware while bypassing popular security measures, including Microsoft Defender SmartScreen and widely-used adblockers. The campaign leverages trusted piracy platforms to deliver HijackLoader, a modular malware framework that has become increasingly…

Crypto Developers Attacked With Malicious npm Packages to Steal Login Details

A sophisticated new threat campaign has emerged targeting cryptocurrency developers through malicious npm packages designed to steal sensitive credentials and wallet information. The attack, dubbed “Solana-Scan” by researchers, specifically targets the Solana cryptocurrency ecosystem by masquerading as legitimate software development…

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting Microsoft Help Index Files (.mshi) to deliver the notorious PipeMagic backdoor, marking a significant evolution in the threat actors’ tactics since the malware’s first detection in 2022. The campaign, which has…

Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed

A sophisticated zero-day exploitation script targeting SAP systems has emerged in the cybersecurity landscape, demonstrating advanced remote code execution capabilities that pose significant risks to enterprise environments worldwide. The malicious payload specifically targets SAP NetWeaver Application Server vulnerabilities, exploiting weaknesses…

Linux Kernel Netfilter Vulnerability Let Attackers Escalate Privileges

A critical vulnerability in the Linux kernel’s netfilter ipset subsystem has been discovered that allows local attackers to escalate privileges to root-level access.  The flaw, identified in the bitmap:ip implementation within the ipset framework, stems from insufficient range validation when…

Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems

Bragg Gaming Group has confirmed a significant cybersecurity incident that compromised the company’s internal IT infrastructure early Saturday morning, August 16, 2025.  The online gaming technology provider discovered unauthorized network intrusion attempts that successfully breached their security perimeter, prompting immediate…

What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like C and C++. These vulnerabilities occur when a program continues to use a memory location…

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute arbitrary code on industrial control systems.  The vulnerability, tracked as CVE-2025-7353, affects multiple ControlLogix Ethernet modules and carries a maximum…

Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time

A cybersecurity researcher has discovered that hundreds of publicly accessible TeslaMate installations are exposing sensitive Tesla vehicle data without authentication, revealing GPS coordinates, charging patterns, and personal driving habits to anyone on the internet.  The vulnerability stems from misconfigured deployments…

North Korean Hackers Stealthy Linux Malware Leaked Online

In a significant breach of both cybersecurity defenses and secrecy, a trove of sensitive hacking tools and technical documentation, believed to originate from a North Korean threat actor, has recently been leaked online. The dump, revealed through an extensive article…

CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure

CISA in collaboration with international partners, has released comprehensive guidance, titled “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators,” to strengthen cybersecurity defenses across critical infrastructure sectors. The document emphasizes the critical importance of maintaining accurate operational…