Tag: Cyber Security News

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account

Mozilla has issued an urgent security alert to its developer community following the detection of a sophisticated phishing campaign specifically targeting AMO (addons.mozilla.org) accounts. The company’s security team, led by Scott DeVaney, reported on August 1, 2025, that cybercriminals are…

Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day

Researchers exploited CVE-2025-38001—a previously unknown Use-After-Free (UAF) vulnerability in the Linux HFSC queuing discipline—to compromise all Google kernelCTF instances (LTS, COS, and mitigation) as well as fully patched Debian 12 systems.  Their work netted an estimated $82,000 in cumulative bounties…

FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition

A critical security vulnerability affecting multiple FUJIFILM printer models could allow attackers to trigger denial-of-service (DoS) conditions through malicious network packets.  The vulnerability, tracked as CVE-2025-48499, was announced on August 4, 2025, and affects various DocuPrint and Apoes printer series.…

LARGEST EVER Bitcoin Hack Valued $3.5 Billion Uncovered

The largest cryptocurrency hack ever recorded involved the theft of 127,426 BTC from Chinese mining pool LuBian in December 2020.  The stolen Bitcoin was worth approximately $3.5 billion at the time of the theft and has since appreciated to an…

Critical Squid Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Squid Web Proxy Cache that enables attackers to execute remote code through a heap buffer overflow in URN (Uniform Resource Name) handling.  The vulnerability, tracked as CVE-2025-54574, affects all Squid versions prior…

Hackers Use AI to Create Malicious NPM Package that Drains Your Crypto Wallet

Cybercriminals have escalated their attack sophistication by leveraging artificial intelligence to create a malicious NPM package that masquerades as a legitimate development tool while secretly draining cryptocurrency wallets. The package, named @kodane/patch-manager, presents itself as an “NPM Registry Cache Manager”…

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online

A significant security breach has compromised Microsoft’s PlayReady Digital Rights Management (DRM) system, exposing critical certificates that protect premium streaming content across major platforms including Netflix, Amazon Prime Video, and Disney+. The leak, which surfaced on GitHub through an account…

SafePay Ransomware Infected 260+ Victims Across Multiple Countries

A new ransomware threat has emerged as one of the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming responsibility for over 265 successful attacks spanning multiple continents. The group, which first appeared in September 2024 with limited activity…

Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

The ransomware landscape experienced a significant shift in the second quarter of 2025 as Qilin ransomware emerged as the dominant threat following the unexpected collapse of RansomHub, previously the most prolific ransomware-as-a-service operation. This transition has reshaped the cybercriminal ecosystem,…

Microsoft Teams New Option Let IT admins Run 60-second Silent Test Call

Microsoft has announced a new proactive network monitoring capability for Teams administrators, introducing 60-second silent test calls designed to assess network quality without disrupting user experiences.  The feature represents a significant advancement in enterprise communication infrastructure management. Key Takeaways1.  IT…

Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

A sophisticated attack technique was uncovered where cybercriminals exploit free trials of Endpoint Detection and Response (EDR) software to disable existing security protections on compromised systems.  This method, dubbed BYOEDR (Bring Your Own EDR), represents a concerning evolution in defense…

NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets

A sophisticated new threat has emerged in the cybercriminal landscape, masquerading as an educational tool while orchestrating large-scale credential theft and wallet compromise operations. NOVABLIGHT, a NodeJS-based Malware-as-a-Service (MaaS) information stealer, represents a concerning evolution in cybercrime accessibility, allowing virtually…

Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media

A sophisticated cyberattack campaign targeting the Russian IT industry has emerged, demonstrating how threat actors are increasingly leveraging legitimate online platforms to distribute the notorious Cobalt Strike Beacon malware. The campaign, which peaked during November and December 2024 and continued…

5 Best IT Infrastructure Modernisation Services In 2025

In 2025, modernizing outdated IT infrastructure is key for organizations aiming to stay competitive, secure, and scalable.  Finding a reliable partner is not easy, so for this guide, we’ve prepared the list of the 5 best IT infrastructure modernisation services…

Hacker Arrested for Stealing Users Personal Data from Spanish Banks

Spanish authorities have successfully apprehended a sophisticated cybercriminal operating from Girona province, who allegedly orchestrated multiple data breaches targeting financial institutions, educational organizations, and private companies.  The arrest represents a significant victory in the ongoing fight against cybercrime in Spain,…

20 Best Inventory Management Tools in 2025

Inventory management tools streamline tracking and managing stock levels, orders, sales, and deliveries. It provides real-time visibility into inventory across multiple locations, ensuring accurate stock levels and reducing the risk of overstocking or stockouts. These tools often include features for…

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device

A financially motivated threat group known as UNC2891 orchestrated a sophisticated attack on banking infrastructure by physically installing a 4G-equipped Raspberry Pi device directly into an ATM network, security researchers from Group-IB revealed this week. The campaign represents a rare…

20 Best Kubernetes Monitoring Tools in 2025

Kubernetes monitoring tools are essential for maintaining the health, performance, and reliability of Kubernetes clusters. These tools provide real-time visibility into the state of clusters, nodes, and pods, allowing administrators to identify and resolve issues quickly. They offer detailed metrics…

ChatGPT, Gemini, GenAI Tools Vulnerable to Man-in-the-Prompt Attacks

A critical vulnerability affecting popular AI tools, including ChatGPT, Google Gemini, and other generative AI platforms, exposes them to a novel attack vector dubbed “Man-in-the-Prompt.”  The research reveals that malicious browser extensions can exploit the Document Object Model (DOM) to…

Free Decryptor Released for AI-Assisted FunkSec Ransomware

Cybersecurity researchers have successfully developed and released a free decryption tool for the FunkSec ransomware, a malicious strain that leveraged artificial intelligence capabilities to enhance its operations. The ransomware campaign, which targeted 113 victims between December 2024 and March 2025,…

New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets

A sophisticated new malware campaign targeting cryptocurrency application users has emerged, leveraging compiled JavaScript files and Node.js to steal digital wallets and credentials with unprecedented stealth. The campaign, dubbed JSCEAL, represents a significant evolution in cybercriminal tactics, utilizing advanced evasion…

AI Vibe Coding Platform Hacked – Logic Flaw Exposes Private App Access

A severe authentication bypass vulnerability in Base44, a popular AI-powered vibe coding platform recently acquired by Wix, could have allowed attackers unauthorized access to private enterprise applications and sensitive corporate data. The vulnerability, which was patched within 24 hours of…

BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns

A sophisticated bulletproof hosting operation has emerged as a critical enabler of global malware campaigns, with cybersecurity researchers uncovering extensive evidence linking UK-registered company Qwins Ltd to widespread cybercriminal activities. The company, operating under Autonomous System Number (ASN) 213702, has…

Threat Actors Allegedly Claim Access to Nokia’s Internal Network

A threat actor, Tsar0Byte, allegedly claimed to have breached the company’s internal network through a vulnerable third-party link, exposing sensitive data belonging to more than 94,500 employees. The alleged breach, reported on dark web forums including DarkForums, represents one of…

Palo Alto Networks to Acquire CyberArk in $25 Billion Deal

Palo Alto Networks, a leader in cybersecurity, announced today that it has agreed to acquire CyberArk, a company known for identity security, for about $25 billion. This move is expected to change the cybersecurity industry significantly. The deal marks Palo…

5 Email Attacks SOCs Cannot Detect Without A Sandbox

Even with Slack, Teams, and every new communication tool out there, email remains the top attack vector for businesses. Why? Because it’s familiar, trusted, and easy to exploit.  One convincing message is all it takes and threats slip right past…

15 Best Website Monitoring Tools in 2025

Website monitoring tools are essential for real-time tracking of websites’ performance, availability, and functionality. They help identify and resolve downtime, slow page load times, and broken links, ensuring an optimal user experience. These tools provide detailed analytics and reports, offering…

10 Best Dark Web Monitoring Tools in 2025

Monitoring and tracking actions on the dark web, a section of the internet that is hidden and requires particular software and configurations to access, is called monitoring. The selling of stolen data, illegal drugs, illegal weapons, hacking services, and other…

Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks

Microsoft has unveiled a comprehensive defense-in-depth strategy to combat indirect prompt injection attacks, one of the most significant security threats facing large language model (LLM) implementations in enterprise environments.  The company’s multi-layered approach combines preventative techniques, detection tools, and impact…

Enterprise LLMs Under Risk: How Simple Prompts Can Lead to Major Breaches

Enterprise applications integrating Large Language Models (LLMs) face unprecedented security vulnerabilities that can be exploited through deceptively simple prompt injection attacks.  Recent security assessments reveal that attackers can bypass authentication systems, extract sensitive data, and execute unauthorized commands using nothing…