Category: CyberSecurityNews

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits
16
Jul
2025

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Dozens of Fortinet FortiWeb instances have been compromised with webshells in a widespread hacking campaign, according to the threat monitoring…

MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials
16
Jul
2025

MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials

A sophisticated MacOS malware campaign dubbed NimDoor has emerged, targeting Web3 and cryptocurrency organizations through weaponized Zoom SDK updates. The…

Albemarle County Hit By Ransomware Attack
16
Jul
2025

Albemarle County Hit By Ransomware Attack

Albemarle County, Virginia, has fallen victim to a sophisticated ransomware attack that compromised the personal information of county residents, local…

Microsoft Details on How Security Copilot in Intune and Entra Helps Security and IT Teams
16
Jul
2025

Microsoft Details on How Security Copilot in Intune and Entra Helps Security and IT Teams

Microsoft has announced significant enhancements to its AI-powered security platform, marking the general availability of Microsoft Security Copilot capabilities within…

Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim
16
Jul
2025

Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim

Hill ASC Inc.’s $14.75 million settlement with the U.S. Department of Justice closes a five-year saga in which the Rockville-based…

DShield Honeypot Scanning Reaches Record-High
16
Jul
2025

DShield Honeypot Scanning Reaches Record-High

The cybersecurity landscape has witnessed an unprecedented surge in malicious scanning activity, with DShield honeypots recording over one million log…

VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host
16
Jul
2025

VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host

Multiple severe vulnerabilities have been addressed affecting VMware ESXi, Workstation, Fusion, and Tools that could allow attackers to execute malicious…

Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders
16
Jul
2025

Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders

A sophisticated new credential stealer disguised as a legitimate forensic toolkit has emerged on GitHub, targeting sensitive user data including…

17,000+ Fake News Websites Caught Promoting Investment Frauds
16
Jul
2025

17,000+ Fake News Websites Caught Promoting Investment Frauds

A massive network of fraudulent news websites has been uncovered, with cybersecurity researchers identifying over 17,000 Baiting News Sites (BNS)…

North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware
16
Jul
2025

North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware

North Korean threat actors have escalated their software supply chain attacks with the deployment of 67 malicious npm packages that…

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data
16
Jul
2025

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data

The cybersecurity landscape has witnessed an alarming evolution in hacktivist operations, with threat actors increasingly shifting their focus from traditional…

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
16
Jul
2025

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups

North Korean threat actors have escalated their sophisticated cyber operations against cryptocurrency startups, deploying an evolved malware campaign that leverages…