Category: CyberSecurityNews

Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT
22
Jul
2025

Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT

A financially motivated threat group dubbed Greedy Sponge has been systematically targeting Mexican financial institutions and organizations since 2021 with…

DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools
22
Jul
2025

DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools

A sophisticated new phishing campaign has emerged, delivering the DeerStealer malware through weaponized .LNK shortcut files that exploit legitimate Windows…

Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers' npm Tokens
22
Jul
2025

Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens

A sophisticated supply chain attack has compromised several widely-used npm packages, including eslint-config-prettier and eslint-plugin-prettier, after threat actors successfully stole…

Developers Beware of npm Phishing Email That Steal Your Login Credentials
22
Jul
2025

Developers Beware of npm Phishing Email That Steal Your Login Credentials

A sophisticated phishing campaign has emerged targeting Node.js developers through a meticulously crafted attack that impersonates the official npm package…

NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard
21
Jul
2025

NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard

FortiGuard Labs has discovered a sophisticated new ransomware strain called NailaoLocker that represents a significant departure from conventional encryption malware….

Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware
21
Jul
2025

Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware

Cybercriminals have escalated their attack sophistication by utilizing legitimate cloud storage services to distribute advanced malware, as demonstrated in a…

New KAWA4096’s Ransomware Leverages Windows Management Instrumentation to Delete Shadow Copies
21
Jul
2025

New KAWA4096’s Ransomware Leverages Windows Management Instrumentation to Delete Shadow Copies

A sophisticated new ransomware strain named KAWA4096 has emerged in the cybersecurity landscape, showcasing advanced evasion techniques and borrowing design…

Livewire Vulnerability Exposes Millions of Laravel Apps to Remote Code Execution Attacks
21
Jul
2025

Livewire Vulnerability Exposes Millions of Laravel Apps to Remote Code Execution Attacks

A critical security vulnerability in Laravel’s Livewire framework has been discovered that could expose millions of web applications to remote…

CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild
21
Jul
2025

CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild

CISA has issued an urgent warning about a critical zero-day remote code execution vulnerability affecting Microsoft SharePoint Server on-premises installations…

Weak Password Let Ransomware Gang Destroy 158-Year-Old Company
21
Jul
2025

Weak Password Let Ransomware Gang Destroy 158-Year-Old Company

A single compromised password brought down KNP Logistics, putting 730 employees out of work and highlighting the devastating impact of…

Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions
21
Jul
2025

Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions

A critical configuration flaw in Microsoft’s AppLocker block list policy has been discovered, revealing how attackers could potentially bypass security…

Surveillance Company Using SS7 Bypass Attack to Track the User's Location Information
21
Jul
2025

Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information

A surveillance company has been detected exploiting a sophisticated SS7 bypass technique to track mobile phone users’ locations. The attack…