A groundbreaking cybersecurity threat has emerged as researchers document the first confirmed case of malware exploiting Microsoft’s User Interface Automation (UIA) framework in active attacks. The Coyote banking trojan, initially discovered in February 2024, has evolved to incorporate this sophisticated…
Tag: Cyber Security News
CISA Warns of Chinese Hackers Exploiting SharePoint 0-Day Flaws in Active Exploitation
CISA has issued an urgent alert regarding active exploitation of critical Microsoft SharePoint vulnerabilities by suspected Chinese threat actors. The attack campaign, dubbed “ToolShell,” leverages a vulnerability chain involving CVE-2025-49706 (network spoofing) and CVE-2025-49704 (remote code execution) to gain unauthorized…
US Nuclear Weapons Agency Breached by Hackers Using SharePoint 0-Day Vulnerability
The National Nuclear Security Administration (NNSA) has fallen victim to a sophisticated cyber attack exploiting a previously unknown vulnerability in Microsoft SharePoint, marking one of the most significant security breaches targeting critical US defense infrastructure this year. Chinese government-affiliated hacking…
Firefox 141 Released With Fix for Multiple Vulnerabilities – Update Now
Mozilla has released Firefox 141 to address 17 security vulnerabilities, including several high-impact flaws that could potentially allow arbitrary code execution. The Mozilla Foundation Security Advisory, announced on July 22, 2025, urges users to update immediately to protect against these…
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers
The Clorox Company, a leading household goods manufacturer, has filed a $380 million lawsuit against IT services provider Cognizant Technology Solutions. The lawsuit accuses Cognizant’s help-desk agents of inadvertently providing hackers with access to Clorox’s network during a security breach…
Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
Remote Monitoring and Management (RMM) software has long been the silent partner of help-desk engineers, automating patch cycles and troubleshooting sessions across sprawling enterprises. Over the past year, however, the same remote consoles have been quietly repurposed by ransomware gangs…
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild
CISA has issued an urgent warning regarding two critical Microsoft SharePoint vulnerabilities that threat actors are actively exploiting in the wild. The vulnerabilities, designated as CVE-2025-49704 and CVE-2025-49706, pose significant risks to organizations running on-premises SharePoint servers and have been…
Windows 11 Gets New Black Screen of Death With Auto Recovery Tool
Microsoft has unveiled significant improvements to Windows 11’s system recovery capabilities, introducing a redesigned Black Screen of Death restart screen alongside an automated Quick Machine Recovery (QMR) tool. These enhancements are part of the broader Windows Resiliency Initiative (WRI), designed…
Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Flaw in the Wild
Microsoft has confirmed that Chinese state-sponsored threat actors are actively exploiting critical zero-day vulnerabilities in on-premises SharePoint servers, prompting urgent security warnings for organizations worldwide. The tech giant’s Security Response Center reported coordinated attacks targeting internet-facing SharePoint installations using newly…
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users
Kali Linux has announced the release of two groundbreaking packages that significantly enhance wireless penetration testing capabilities for Raspberry Pi users. The new brcmfmac-nexmon-dkms and firmware-nexmon packages, introduced in Kali Linux 2025.1, enable the onboard Wi-Fi interface on supported Raspberry…
Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code
Google has released an urgent security update for its Chrome browser, addressing three critical vulnerabilities that could enable attackers to execute arbitrary code on users’ systems. The Stable channel update to version 138.0.7204.168/.169 for Windows and Mac, and 138.0.7204.168 for…
Scavenger Malware Hijacks Popular npm Packages to Attack Developers
A sophisticated supply chain attack targeting JavaScript developers emerged on Friday, July 18th, 2025, when cybercriminals compromised multiple popular npm packages to distribute the newly identified “Scavenger” malware. The attack primarily focused on eslint-config-prettier, a widely-used code formatting package, along…
Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network
A groundbreaking investigation has pulled back the curtain on one of Russia’s most clandestine intelligence operations, revealing unprecedented details about the Federal Security Service’s (FSB) 16th Center and its extensive signals intelligence network. The research, conducted by CheckFirst analysts over…
Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet
Cybersecurity researchers have uncovered a sophisticated attack campaign targeting poorly managed Linux servers through SSH brute force attacks to deploy the SVF Botnet, a Python-based distributed denial-of-service malware. The malware leverages Discord as its command-and-control infrastructure and employs multiple proxy…
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
A sophisticated phishing campaign targeting Web3 developers has emerged, exploiting the growing interest in artificial intelligence platforms to deliver credential-stealing malware. The threat actor LARVA-208, previously known for targeting IT staff through phone-based social engineering, has pivoted to focus on…
How to Conduct a Secure Code Review – Tools and Techniques
Secure code review represents a critical security practice that systematically examines software source code to identify and remediate security vulnerabilities before they reach production environments. This comprehensive examination serves as a proactive defense mechanism, enabling development teams to detect security…
Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors
[London, UK] July 2025 – As cryptocurrency continues its evolution into a mainstream financial asset class, a growing number of investors are turning to new strategies for generating yield—without the risks of high-frequency trading. Addressing this demand, UK-based Quid Miner…
How to Use Threat Intelligence to Enhance Cybersecurity Operations
Threat intelligence represents a paradigm shift from reactive to proactive cybersecurity, providing organizations with actionable insights to detect, prevent, and respond to cyber threats more effectively. By leveraging structured data about current and emerging threats, security teams can make informed…
Securing Virtualized Environments – Hypervisor Security Best Practices
Hypervisor security represents a critical foundation for protecting virtualized infrastructure, as a single compromise at the hypervisor level can potentially expose all virtual machines running on that host. The security of virtualized environments depends on implementing comprehensive hardening measures across…
Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities
The OWASP Top 10 2021 represents the most critical web application security risks facing organizations today, with significant shifts reflecting the evolving threat landscape. Broken Access Control has risen to the top position, affecting 94% of tested applications. At the…