Tag: Cyber Security News

Meta’s New Feature Transforms Instagram to a New Real-Time Location Broadcaster

Meta has introduced a groundbreaking feature that fundamentally transforms Instagram from a traditional photo-sharing platform into a comprehensive real-time location broadcasting system. The new “Map” functionality represents a significant architectural shift in social media design, enabling users to continuously transmit…

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

In recent weeks, a flurry of sponsored listings promising preorders for Tesla’s anticipated Optimus robots began appearing at the top of Google search results. These advertisements directed unsuspecting users to counterfeit microsites mimicking Tesla’s design, purporting to accept $250 “non-refundable”…

ClickFix Malware Attacks macOS Users to Steal Login Credentials

In recent months, security researchers have observed a novel phishing campaign targeting macOS users under the guise of a CAPTCHA verification process. This attack, dubbed “ClickFix,” leverages a blend of social engineering and operating system detection to coax victims into…

AI Coding Assistant Creating a Perfect Blueprints for Attackers

The cybersecurity landscape faces an unprecedented threat as artificial intelligence coding assistants inadvertently transform into reconnaissance tools for malicious actors. A recent investigation reveals how developers’ interactions with AI tools like Claude CLI and GitHub Copilot are creating comprehensive attack…

SSHamble – New Open Source Tool to Exploit Vulnerabilities in SSH Protocol

SSHAmble is a powerful open-source reconnaissance tool designed to identify and exploit vulnerabilities in SSH implementations across internet-facing systems.  Presented at DEFCON 33, this research tool has already uncovered significant security flaws in major networking equipment and exposed widespread SSH…

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

An urgent security update has been released for Xerox FreeFlow Core software, addressing two critical vulnerabilities that could allow attackers to execute remote code and perform server-side request forgery attacks.  The vulnerabilities, identified as CVE-2025-8355 and CVE-2025-8356, affect FreeFlow Core…

7-Zip Arbitrary File Write Vulnerability Allows Attackers to Execute Code

A newly disclosed security vulnerability in the popular 7-Zip file compression software has raised significant concerns in the cybersecurity community. CVE-2025-55188, discovered and reported by security researcher Landon on August 9, 2025, allows attackers to perform arbitrary file writes during…

GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks

Researchers have compromised OpenAI’s latest GPT-5 model using sophisticated echo chamber and storytelling attack vectors, revealing critical vulnerabilities in the company’s most advanced AI system.  The breakthrough demonstrates how adversarial prompt engineering can bypass even the most robust safety mechanisms,…

Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams

Darknet markets, operating beyond the reach of traditional payment processors and legal systems, rely on escrow systems to secure cryptocurrency transactions between buyers and vendors.  These systems, using multisignature wallets and automated release mechanisms, aim to ensure transaction security and…

5,000+ Fake Online Pharmacies Websites Selling Counterfeit Medicines

A sophisticated cybercriminal enterprise operating over 5,000 fraudulent online pharmacy websites has been exposed in a comprehensive investigation, revealing one of the largest pharmaceutical fraud networks ever documented. This massive operation, orchestrated by a single threat actor group, targets vulnerable…

DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation

A sophisticated information-stealing malware campaign has emerged, utilizing advanced obfuscation techniques and multiple infection vectors to evade traditional security controls. The DarkCloud Stealer, first documented in recent threat intelligence reports, represents a significant evolution in cybercriminal tactics, employing a complex…

Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack

Critical security flaws in Axis Communications’ surveillance infrastructure have left over 6,500 organizations worldwide vulnerable to sophisticated cyberattacks, with potential impacts spanning government agencies, educational institutions, and Fortune 500 companies. The Swedish security camera manufacturer’s popular video surveillance products contain…

ChatGPT-5 Released: What’s New With the Next-Generation AI Agent

OpenAI has officially launched ChatGPT-5, a new generation of its AI agent that introduces a sophisticated, unified system designed to be faster, more intelligent, and significantly more useful for real-world applications. This release marks a significant evolution from its predecessors,…

Guided Selling in 3D Product Configurators

People don’t want to guess when they buy something – especially something complex or customizable. They want to feel like they’re making the right choice. But with many ecommerce stores, it’s easy to feel lost: too many options, confusing specs,…

Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks

A sophisticated cybercriminal operation that targeted American tax preparation businesses through spearphishing campaigns has culminated in the extradition of Nigerian national Chukwuemeka Victor Amachukwu from France to face federal charges in New York. The 39-year-old defendant, operating under multiple aliases…

WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities

WhatsApp has successfully dismantled 6.8 million accounts linked to fraudulent activities during the first half of 2024, representing a significant escalation in the platform’s fight against organized cybercrime.  The takedown operation, announced by parent company Meta, specifically targeted scam centers…

CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers – Discloses IOCs and detection signatures

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an urgent analysis in early July 2025, detailing a sophisticated exploit chain targeting on-premises Microsoft SharePoint servers. Dubbed “ToolShell,” the campaign leverages two fresh vulnerabilities—CVE-2025-49706, a network spoofing flaw, and CVE-2025-49704,…

Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses

Cybersecurity researchers have uncovered a sophisticated spear phishing campaign that weaponizes Microsoft 365’s Direct Send feature to bypass traditional email security defenses and conduct hyper-personalized credential theft attacks. The campaign demonstrates an alarming evolution in attack sophistication, combining technical exploitation…

ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub

The North Korean state-sponsored Advanced Persistent Threat (APT) group ScarCruft has launched a sophisticated new malware campaign targeting South Korean users through a deceptive postal-code update notice. This latest attack represents a significant evolution in the group’s operational capabilities, marking…

Nvidia Says No Backdoors, No Kill Switches, and No Spyware in its Chips

Nvidia Corporation has issued a strong statement asserting that its graphics processing units (GPUs) contain no backdoors, kill switches, or spyware, directly addressing growing concerns from policymakers about potential hardware-based control mechanisms.  The semiconductor giant’s declaration comes as some industry…

10 Best Data Loss Prevention Software in 2025

Data Loss Prevention (DLP) software is a critical cybersecurity solution designed to protect sensitive data from leaving an organization’s network. In an era where data is a company’s most valuable asset, and regulatory penalties for data breaches are severe, DLP…

HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code

Security researchers uncovered a series of critical zero-day vulnerabilities in HashiCorp Vault in early August 2025, the widely adopted secrets management solution. These flaws, spanning authentication bypasses, policy enforcement inconsistencies, and audit-log abuse, create end-to-end attack paths that culminate in…

Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds

Threat actors successfully compromised corporate systems within just five minutes using a combination of social engineering tactics and rapid PowerShell execution.  The incident, investigated by NCC Group’s Digital Forensics and Incident Response (DFIR) team, demonstrates how cybercriminals are weaponizing trusted…

Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities

Two sophisticated ransomware operations have emerged as significant threats to managed service providers (MSPs) and small businesses, with the Akira and Lynx groups deploying advanced attack techniques that combine stolen credentials with vulnerability exploitation. These ransomware-as-a-service (RaaS) operations have collectively…

Global Jewellery Brand Pandora Suffers Hacked – Customer Data Exposed

Danish jewellery giant Pandora has disclosed a significant data breach that compromised customer information through a third-party vendor platform.  The company has begun notifying affected customers, starting with Italian markets, about the cybersecurity incident that resulted in unauthorized access to…

Sophisticated DevilsTongue Windows Spyware Tracking Users Globally

The emergence of DevilsTongue marks a significant escalation in mercenary spyware capabilities, leveraging advanced Windows-based techniques to infiltrate high-value targets worldwide. First observed in campaigns dating back to 2019, this modular malware aggressively exploits zero-day browser vulnerabilities and weaponized documents…

Adobe AEM Forms 0-Day Vulnerability Let Attackers Execute Arbitrary Code

Adobe has released an urgent security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE) to address two critical zero-day vulnerabilities that could allow attackers to execute arbitrary code and perform unauthorized file system access.  The vulnerabilities, identified…

Chinese Hackers Compromised Up To 115 Million Payment Cards In The US

A sophisticated Chinese cybercriminal syndicate has orchestrated one of the most devastating payment card fraud operations in recorded history, potentially compromising between 12.7 million and 115 million payment cards across the United States between July 2023 and October 2024. The…

Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’

Cybersecurity researchers have uncovered a sophisticated search engine optimization (SEO) poisoning campaign that exploited Bing search results to distribute Bumblebee malware, ultimately leading to devastating Akira ransomware attacks. The campaign, active throughout July 2025, specifically targeted users searching for legitimate…

U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity

The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) has issued a critical warning about the exploitation of convertible virtual currency (CVC) kiosks by criminal organizations. Released on August 4, 2025, the advisory highlights how these cryptocurrency ATMs,…

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV) Catalog. The inclusion of these flaws in the catalog signifies that they are being actively…

How To Get Real-Time IOCs From Incidents Across 15K SOCs

Cybersecurity is about staying one step ahead. The security of business assets hinges on proactive threat detection and rapid response powered by data. Every security system and service from network monitoring and incident response to analytics depends on continuous data…

Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

French luxury fashion house Chanel has become the latest victim in a sophisticated cybercrime campaign targeting major corporations through their Salesforce customer relationship management systems. The company confirmed on July 25, 2025, that unauthorized threat actors had breached a database…

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control

A critical vulnerability chain in NVIDIA’s Triton Inference Server that allows unauthenticated attackers to achieve complete remote code execution (RCE) and gain full control over AI servers.  The vulnerability chain, identified as CVE-2025-23319, CVE-2025-23320, and CVE-2025-23334, exploits the server’s Python…