Category: CyberSecurityNews

Akamai Patches HTTP Request Smuggling Vulnerability in Edge Servers
04
Dec
2025

Akamai Patches HTTP Request Smuggling Vulnerability in Edge Servers

A critical HTTP request smuggling vulnerability in Akamai’s edge server infrastructure has been successfully fixed. The vulnerability, identified as CVE-2025-66373,…

New 'Sryxen' Stealer Bypasses Chrome Encryption via Headless Browser Technique
04
Dec
2025

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

A new information stealer called Sryxen has emerged in the underground malware market, targeting Windows systems with advanced techniques to…

Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
04
Dec
2025

Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens

A sophisticated phishing toolkit known as Evilginx is empowering attackers to execute advanced attacker-in-the-middle (AiTM) campaigns with alarming success. These…

Vim for Windows Vulnerability Let Attackers Execute Arbitrary Code
04
Dec
2025

Vim for Windows Vulnerability Let Attackers Execute Arbitrary Code

A critical security vulnerability has been discovered in Vim for Windows that could allow attackers to execute malicious code on…

Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
04
Dec
2025

Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Legitimate administrative tools are increasingly becoming the weapon of choice for sophisticated threat actors aiming to blend in with normal…

Hackers Actively Exploiting Worpress Plugin Vulnerability to Execute Remote Code
04
Dec
2025

Hackers Actively Exploiting Worpress Plugin Vulnerability to Execute Remote Code

A critical remote code execution vulnerability in the Sneeit Framework WordPress plugin has come under active exploitation by threat actors,…

CISA Releases Five ICS Advisories Covering Vulnerabilities, and Exploits Surrounding ICS
04
Dec
2025

CISA Releases Five ICS Advisories Covering Vulnerabilities, and Exploits Surrounding ICS

The Cybersecurity and Infrastructure Security Agency released five critical Industrial Control Systems advisories on December 2, 2025, addressing significant security…

New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
04
Dec
2025

New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)

A new security assessment tool has been released to help researchers and administrators identify React Server Components (RSC) endpoints potentially…

Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
04
Dec
2025

Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware

A sophisticated attack campaign known as Operation DupeHike has emerged as a significant threat to Russian corporate environments, specifically targeting…

Critical React and Next.js Enables Remote Attackers to Execute Malicious Code
04
Dec
2025

Critical React and Next.js Enables Remote Attackers to Execute Malicious Code

A critical security flaw in React and Next.js could let remote attackers run malicious code on servers without logging in….

Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT
04
Dec
2025

Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

A fake Visual Studio Code extension has been used in a supply chain attack that targets developers through their editor….

Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads
04
Dec
2025

Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads

The open-source software supply chain recently encountered a deceptive threat in the form of evm-units, a malicious Rust crate published…