The U.S. Department of Justice announced coordinated nationwide law enforcement actions on June 30, 2025, targeting North Korean remote information technology workers’ illicit revenue generation schemes that have defrauded American companies and funded the DPRK’s weapons programs. Summary1. The U.S.…
Tag: Cyber Security News
CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks
CISA has issued an urgent warning regarding a critical buffer overflow vulnerability in Citrix NetScaler ADC and Gateway products, designated as CVE-2025-6543. Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on June 30, 2025, threat actors are actively exploiting this…
Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root
A critical security vulnerability in the widely used Linux Sudo utility has been disclosed, allowing any local unprivileged user to escalate privileges to root access. Summary1. CVE-2025-32463 affects Sudo versions 1.9.14-1.9.17, enabling privilege escalation to root.2. Exploitation uses the chroot…
Top 20 Best Endpoint Management Tools – 2025
Endpoint management is now a cornerstone of modern IT operations, enabling organizations to secure, monitor, and optimize devices across diverse environments. As hybrid and remote work models continue to expand, the need for robust endpoint management tools is greater than…
CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure
The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, Department of Defense Cyber Crime Center, and National Security Agency, has issued an urgent warning regarding potential cyber attacks by Iranian-affiliated actors targeting U.S. critical infrastructure. Despite ongoing ceasefire…
Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code – Patch Now
Google has issued an urgent security update for Chrome browser users worldwide, addressing a critical zero-day vulnerability that is actively being exploited by cybercriminals. The high-severity flaw, designated CVE-2025-6554, allows attackers to execute arbitrary code on affected systems through a…
Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows
A sophisticated new phishing campaign has emerged, leveraging obsolete Windows file formats and advanced evasion techniques to distribute the notorious Remcos Remote Access Trojan. The attack chain employs DBatLoader as its primary delivery mechanism, utilizing a combination of User Account…
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability
Over 2,100 vulnerable Citrix NetScaler servers remain exposed to active exploitation, despite patches being available for critical vulnerabilities that allow attackers to bypass authentication mechanisms and steal session tokens. Cybersecurity firm ReliaQuest has issued warnings about active exploitation of two…
RIFT – New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries
Microsoft has released RIFT (Rust Identification and Function Tagging), a groundbreaking open-source tool designed to help cybersecurity analysts identify and analyze malware concealed within Rust binaries. The cybersecurity community has witnessed a significant shift toward Rust-based malware development over the…
Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely
Multiple critical vulnerabilities in D-Link router models could allow remote attackers to execute arbitrary code and gain unauthorized access to the network infrastructure. The vulnerabilities affect all hardware revisions and firmware versions of the non-US DIR-816 models, which have now…
Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords
Cybercriminals have launched a sophisticated campaign exploiting Facebook’s advertising platform to distribute malware and steal cryptocurrency wallet credentials, targeting users worldwide through deceptive Pi Network-themed advertisements. The malicious operation, which began on June 24, 2025, coincides with the Pi2Day celebration…
SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
Every security practitioner knows that employees are the weakest link in an organization, butthis is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely tofall prey to cyberattacks than employees, making them the new weakest…
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control
Langflow, the popular Python framework for rapid AI prototyping, is under siege after researchers disclosed CVE-2025-3248, a flaw in the /api/v1/validate/code endpoint that lets unauthenticated attackers execute arbitrary Python with a single crafted POST request. Within hours of the public…
25 Best Managed Security Service Providers (MSSP) In 2025
Managed Security Service Providers (MSSPs) are specialized companies that deliver outsourced cybersecurity services to protect businesses from evolving cyber threats. These providers offer a range of services, including 24/7 threat monitoring, incident response, vulnerability management, and compliance support. MSSPs help…
Glasgow City Warns of Parking Fine Scam as Cyber Security Incident Continues
Glasgow City Council has issued an urgent warning to residents about a sophisticated parking fine scam that has emerged amid ongoing cybersecurity concerns affecting the city’s digital infrastructure. The fraudulent scheme targets motorists through text messages and emails claiming they…
Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules
Germany’s data protection authorities have escalated their scrutiny of Chinese artificial intelligence applications, with Berlin’s data protection commissioner Meike Kamp formally requesting Apple and Google to review and potentially remove DeepSeek from their respective app stores. The move, announced on…
10 Best Free Malware Analysis Tools To Break Down The Malware Samples – 2025
Malware analysis is a critical skill for cybersecurity professionals, threat hunters, and incident responders. With the growing sophistication of cyber threats, having access to reliable, free malware analysis tools is essential for dissecting, understanding, and mitigating malicious software. This article…
Scattered Spider Attacking Tech Companies Using Phishing Frameworks Like Evilginx and Social Engineering Methods
Scattered Spider burst onto the cybersecurity stage in early 2022 as little more than a SIM-swapping crew, but by mid-2025 it had pivoted into a full-scale, financially motivated threat group leveraging advanced phishing toolkits to breach some of the world’s…
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds
A major security flaw affecting millions of Bluetooth headphones and earbuds has been discovered, allowing attackers to remotely hijack devices and spy on users without requiring any authentication or pairing. The vulnerabilities, identified by cybersecurity researchers at ERNW, affect devices…
DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads
DragonForce ransomware has emerged as one of the most sophisticated threats in the cybercriminal ecosystem, transforming from a hacktivist collective into a mature Ransomware-as-a-Service (RaaS) operation since its debut in December 2023. The group initially gained notoriety through ideologically driven…