VM (Virtual Machine) monitoring tools are essential for maintaining the performance, availability, and security of virtualized environments. These tools provide real-time visibility into VM health and performance, enabling administrators to track key metrics such as CPU usage, memory utilization, disk…
Tag: Cyber Security News
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remote Control
Cybersecurity researchers have uncovered a sophisticated web shell attack targeting Microsoft Internet Information Services (IIS) servers, allowing threat actors to achieve complete remote control over compromised systems. The malicious script, identified as “UpdateChecker.aspx,” represents a significant escalation in web shell…
Critical macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC
A critical macOS vulnerability enables attackers to bypass Transparency, Consent, and Control (TCC) protections and steal sensitive user data, including files from protected directories and Apple Intelligence caches. The vulnerability, dubbed “Sploitlight,” exploits Spotlight plugins to access normally protected information…
10 Best Anti-Phishing Tools in 2025
Anti-phishing tools are essential cybersecurity solutions designed to detect and prevent phishing attacks. These tools identify and block malicious emails, websites, and messages that attempt to deceive users into disclosing sensitive information such as passwords, credit card numbers, and personal…
CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding two critical injection vulnerabilities in Cisco’s Identity Services Engine (ISE) that threat actors are actively exploiting. The vulnerabilities, tracked as CVE-2025-20281 and CVE-2025-20337, allow attackers to achieve remote code execution with root privileges…
GitHub Outage Disrupts Core Services Globally for Users
GitHub experienced a widespread outage on July 28, 2025, affecting millions of developers and organizations reliant on its services. The incident, which impacted API requests, issue tracking, and pull requests, highlighted the vulnerabilities in cloud-based collaboration tools essential for software…
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
Cybersecurity researchers have uncovered a sophisticated web shell attack targeting Microsoft Internet Information Services (IIS) servers, allowing threat actors to achieve complete remote control over compromised systems. The malicious script, identified as “UpdateChecker.aspx,” represents a significant escalation in web shell…
Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now
The cybercriminal landscape has witnessed a dramatic shift with the emergence of sophisticated malware-as-a-service (MaaS) platforms targeting Android devices. Criminal enterprises no longer require extensive technical expertise to deploy advanced mobile threats, as ready-to-use malware kits are now available for…
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered
A sophisticated Russian state-sponsored advanced persistent threat (APT) group known as Laundry Bear has emerged as a significant cybersecurity concern, targeting NATO countries and Ukraine through an extensive campaign of espionage and intelligence gathering. Also tracked as Void Blizzard by…
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration
The cyberthreat landscape witnessed a concerning evolution in 2025 as the notorious Muddled Libra threat group dramatically shifted their attack methodology, pivoting from traditional phishing campaigns to sophisticated voice-based social engineering targeting organizational call centers and help desks. This Western-based…
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access
The Atomic macOS Stealer (AMOS) has undergone a significant evolution, transforming from a traditional information stealer into a sophisticated persistent threat capable of maintaining long-term access to compromised macOS systems. This development marks a critical escalation in the malware’s capabilities,…
New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials
A sophisticated new information stealer named SHUYAL has emerged in the cybersecurity landscape, demonstrating unprecedented scope in its credential harvesting capabilities. The malware targets login credentials from 19 different web browsers, ranging from mainstream applications like Google Chrome and Microsoft…
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack
Russia’s Aeroflot, one of the world’s oldest airlines, has been left scrambling after pro-Ukraine hackers claimed to have “completely destroyed” the carrier’s internal IT infrastructure in a stealthy, year-long campaign. The groups, known as “Silent Crow” and Belarusian counterpart “Cyber…
UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Junos OS
Singapore’s critical infrastructure is under siege from UNC3886, a sophisticated China-linked advanced persistent threat (APT) group. As of July 2025, the group has been actively targeting essential services like energy, water, telecommunications, and government systems, prompting urgent warnings from officials.…
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
The Oyster malware, also known as Broomstick or CleanupLoader, has resurfaced in attacks disguised as popular tools like PuTTY, KeyPass, and WinSCP. This malware, active since at least 2023, tricks users into downloading malicious installers, potentially paving the way for…
Women’s Dating App Tea Exposes Selfie Images of 13,000 Users
The women-only dating safety app Tea has suffered a significant cybersecurity incident, with hackers gaining unauthorized access to approximately 72,000 user images, including 13,000 sensitive selfies and identification documents used for account verification. The breach, which represents one of the…
Threat Actors Allegedly Claiming Breach of Airpay Payment Gateway
Cybercriminals have allegedly compromised Airpay, one of India’s prominent digital payment gateway providers, exposing sensitive financial data of thousands of users and businesses. The threat actors are currently advertising the company’s complete database on dark web marketplaces, raising serious concerns…
New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control
A critical new threat targeting Microsoft SharePoint servers through a sophisticated exploit chain dubbed “ToolShell.” This multi-stage attack combines previously patched vulnerabilities with fresh zero-day exploits to achieve complete system compromise, affecting SharePoint Enterprise Server 2016, SharePoint Server 2019, and…
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations
A major cybersecurity breach has exposed the browsing activities of users visiting one of the internet’s most notorious illegal marketplaces. On Friday, July 18, cybersecurity firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million records of web requests,…
Hackers Compromise Intelligence Website Used by CIA and Other Agencies
Unidentified hackers have successfully breached a critical intelligence website used by the CIA and other U.S. agencies to manage sensitive government contracts, according to the National Reconnaissance Office (NRO), the spy satellite service that operates the compromised platform. The cyberattack…