Category: CyberSecurityNews

Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
28
Jul
2025

Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results

The Oyster malware, also known as Broomstick or CleanupLoader, has resurfaced in attacks disguised as popular tools like PuTTY, KeyPass,…

ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control
28
Jul
2025

ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control

A critical new threat targeting Microsoft SharePoint servers through a sophisticated exploit chain dubbed “ToolShell.” This multi-stage attack combines previously…

Leak Zone Dark Web Forum Database Exposes 22 Million Users' IP Addresses and Locations
28
Jul
2025

Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations

A major cybersecurity breach has exposed the browsing activities of users visiting one of the internet’s most notorious illegal marketplaces. …

Hackers Compromise Intelligence Website Used by CIA and Other Agencies
28
Jul
2025

Hackers Compromise Intelligence Website Used by CIA and Other Agencies

Unidentified hackers have successfully breached a critical intelligence website used by the CIA and other U.S. agencies to manage sensitive…

LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access
28
Jul
2025

LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access

A serious security vulnerability has been discovered in LG Innotek’s LNV5110R camera model that could allow cybercriminals to gain complete…

Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm
28
Jul
2025

Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm

An Arizona woman received a significant federal prison sentence for orchestrating a sophisticated cybercrime operation that enabled North Korean Information…

Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely
28
Jul
2025

Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely

Multiple critical security vulnerabilities affecting Salesforce’s Tableau Server that could allow attackers to execute remote code, bypass authorization controls, and…

Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks
27
Jul
2025

Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks

Welcome to this week’s Cybersecurity Recap. We’re looking at important updates from July 21-27, 2025, in the world of digital…

Allianz Life Insurance Data Breach
27
Jul
2025

Allianz Life Insurance Data Breach

Major U.S. insurance provider Allianz Life Insurance Company confirmed on Saturday that hackers compromised the personal information of the “majority”…

Infamous BreachForums Is Back Online With All Accounts and Posts Restored
26
Jul
2025

Infamous BreachForums Is Back Online With All Accounts and Posts Restored

BreachForums, the notorious cybercrime discussion board that vanished from the clearnet after a law-enforcement seizure in, quietly re-opened this week…

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
26
Jul
2025

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Gaming peripheral manufacturer Endgame Gear has confirmed that hackers successfully compromised its official software distribution system, using the company’s OP1w…

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
26
Jul
2025

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Microsoft Corp. is investigating whether a leak from its Microsoft Active Protections Program (MAPP) enabled Chinese state-sponsored hackers to exploit…