A critical pre-authentication denial of service vulnerability was identified as CVE-2025-6709, affecting multiple versions of MongoDB Server across its 6.0, 7.0, and 8.0 release branches. Summary1. MongoDB CVE-2025-6709 allows unauthenticated attackers to crash servers (CVSS 7.5).2. Malicious JSON payloads with…
Tag: EN
Quantum computers just got an upgrade – and it’s 10× more efficient
Chalmers engineers built a pulse-driven qubit amplifier that’s ten times more efficient, stays cool, and safeguards quantum states—key for bigger, better quantum machines. This article has been indexed from Hacking News — ScienceDaily Read the original article: Quantum computers just…
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain
RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software. The post RevEng.ai Raises $4.15 Million to Secure Software Supply Chain appeared first on SecurityWeek. This article has been…
ClickFix Attacks Soar by 500%: Hackers Intensify Use of This Manipulative Technique to Deceive Users
A novel social engineering technique dubbed “ClickFix” has surged by an alarming 517% between the second half of 2024 and the first half of 2025, as reported by ESET telemetry data. This manipulative attack vector, now the second most prevalent…
Windows 11 Retires Blue Screen of Death Error Replaces With Black Screen
Microsoft is retiring one of computing’s most recognizable error messages after nearly four decades. The iconic Blue Screen of Death (BSOD) that has haunted Windows users since the 1980s will be replaced with a streamlined Black Screen of Death as part…
Threat Actors Embed Malware on Windows System’s Task Scheduler to Maintain Persistence
A sophisticated cyber attack targeting critical national infrastructure in the Middle East has revealed how threat actors are leveraging Windows Task Scheduler to maintain persistent access to compromised systems. The attack involves a malicious variant of the Havoc framework, a…
Chinese Hackers Target Chinese Users With RAT, Rootkit
China-linked Silver Fox hacking group is targeting Chinese users with fake installers carrying a RAT and a rootkit. The post Chinese Hackers Target Chinese Users With RAT, Rootkit appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
APT-C-36 Hackers Launching Cyberattacks on Government Entities, Financial Sectors, and Critical Systems
The cyber threat group APT-C-36, widely known as Blind Eagle, has been orchestrating sophisticated cyberattacks targeting a range of sectors across Latin America, with a pronounced focus on Colombian organizations. This group has consistently zeroed in on government institutions, financial…
Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
The Citrix NetScaler vulnerability tracked as CitrixBleed 2 and CVE-2025–5777 may be exploited in the wild for initial access. The post Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
CitrixBleed 2 Vulnerability Exploited, Recalling Earlier CitrixBleed Fallout
This new CitrixBleed lookalike flaw is being exploited in the wild to gain initial access, according to ReliaQuest This article has been indexed from www.infosecurity-magazine.com Read the original article: CitrixBleed 2 Vulnerability Exploited, Recalling Earlier CitrixBleed Fallout
Your Android phone is getting a big security upgrade for free – here’s what’s new
Google says its latest security features are designed to block scam calls and texts, shady apps, and even phone theft. Here’s how they work. This article has been indexed from Latest stories for ZDNET in Security Read the original article:…
APT42 impersonates cyber professionals to phish Israeli academics and journalists
Iran-linked APT42 targets Israeli experts with phishing attacks, posing as security professionals to steal email credentials and 2FA codes. Iran-linked group APT42 (aka Educated Manticore, Charming Kitten, and Mint Sandstorm) is targeting Israeli journalists, cybersecurity experts, and academics with phishing attacks,…
Vulnerability Exposed All Open VSX Repositories to Takeover
A vulnerability in the extension publishing mechanism of Open VSX could have allowed attackers to tamper with any repository. The post Vulnerability Exposed All Open VSX Repositories to Takeover appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Threat intelligence firm GreyNoise is warning of a “notable surge” in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting that attackers may be preparing for another mass exploitation campaign or probing for unpatched systems.MOVEit Transfer is a…
Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems
A critical security vulnerability has been discovered in multiple Mitsubishi Electric air conditioning systems, potentially allowing hackers to bypass authentication and remotely control affected units. The flaw, identified as CVE-2025-3699, was disclosed by Mitsubishi Electric on June 26, 2025, and…
Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen
After nearly four decades as a symbol of frustration and failure for PC users worldwide, Microsoft is officially retiring the iconic Blue Screen of Death (BSOD) in favor of a new, sleeker Black Screen of Death. The change, set to…
Microsoft 365 Direct Send Abused for Phishing
Hackers are abusing the Microsoft 365 Direct Send feature to deliver phishing emails that bypass email security controls. The post Microsoft 365 Direct Send Abused for Phishing appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Abstract Security Adds Data Lake to Reduce Storage Costs
Abstract Security this week added a data lake, dubbed LakeVilla, to a portfolio of tools for migrating data between cybersecurity tools to provide a less expensive alternative to a security information event management (SIEM) platform for storing data. The post…
MOVEit Transfer Systems Face Fresh Attack Risk Following Scanning Activity Surge
GreyNoise observed a surge in scanning activity targeting MOVEit Transfer systems since May 27, indicating the software could face renewed attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: MOVEit Transfer Systems Face Fresh Attack Risk Following…
ClickFix Attack Emerges by Over 500% – Hackers Actively Using This Technique to Trick Users
A sophisticated new social engineering technique called ClickFix has exploded across the cyberthreat landscape, experiencing an unprecedented surge of 517% between the second half of 2024 and the first half of 2025. This alarming growth has propelled ClickFix to become…