Category: CyberSecurityNews

SonicWall SMA Devices 0-Day RCE Vulnerability Exploited to Deploy OVERSTEP Ransomware
17
Jul
2025

SonicWall SMA Devices 0-Day RCE Vulnerability Exploited to Deploy OVERSTEP Ransomware

SonicWall’s end-of-life SMA 100 series appliances are again on the front line after investigators unearthed a covert campaign that couples…

Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User
17
Jul
2025

Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User

A trio of newly disclosed CVE-2025-6230, CVE-2025-6231 and CVE-2025-6232 underscores how a single trusted OEM utility can become a springboard…

Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack
17
Jul
2025

Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack

Cloudflare’s widely used 1.1.1.1 DNS resolver service experienced a significant 62-minute global outage on July 14, 2025, affecting millions of…

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User
17
Jul
2025

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User

Cisco has disclosed multiple critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that…

Google's AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation
17
Jul
2025

Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation

Google’s revolutionary AI-powered security tool, Big Sleep, has achieved a groundbreaking milestone by discovering and preventing the exploitation of a…

Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
17
Jul
2025

Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites

Cybersecurity researchers have uncovered a sophisticated malware campaign targeting WordPress websites through an ingenious ZIP archive-based attack mechanism. The malware,…

Chinese 'Salt Typhoon' Hackers Hijacked US National Guard Network for Nearly a Year
16
Jul
2025

Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year

Chinese state-sponsored hackers known as Salt Typhoon successfully infiltrated and maintained persistent access to a U.S. state’s Army National Guard…

Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation
16
Jul
2025

Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation

A critical design flaw in Microsoft’s latest Windows Server 2025 enables attackers to bypass authentication and generate passwords for all…

SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar
16
Jul
2025

SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar

Hong Kong’s financial sector is contending with a fresh surge of SquidLoader samples that glide past conventional defenses with almost…

Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware
16
Jul
2025

Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware

A sophisticated cyberattack campaign has emerged in July 2025, weaponizing Microsoft Teams calls to deploy the latest iteration of Matanbuchus…

Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services
16
Jul
2025

Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services

A sophisticated cybercrime group dubbed “Dark Partners” has emerged as a significant threat to cryptocurrency users worldwide, orchestrating large-scale theft…

Top 3 CISO Challenges And How To Solve Them 
16
Jul
2025

Top 3 CISO Challenges And How To Solve Them 

How do you lead a security team when threats evolve faster than your tools? It’s a challenge many CISOs face…