Category: CyberSecurityNews

Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution
08
Sep
2025

Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution

Cybersecurity researchers have demonstrated a sophisticated technique for bypassing Web Application Firewalls (WAFs) using JavaScript injection combined with HTTP parameter…

PoC Exploit Released for ImageMagick RCE Vulnerability
08
Sep
2025

PoC Exploit Released for ImageMagick RCE Vulnerability

A proof-of-concept (PoC) exploit has been released for a critical remote code execution (RCE) vulnerability in ImageMagick 7’s MagickCore subsystem, specifically affecting…

Atomic Stealer Disguised as Cracked Software Attacking macOS Users
08
Sep
2025

Atomic Stealer Disguised as Cracked Software Attacking macOS Users

A sophisticated malware campaign targeting macOS users has emerged, exploiting the widespread desire for free software to deliver the notorious…

Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft
08
Sep
2025

Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft

A sophisticated supply-chain attack that impacted over 700 organizations, including major cybersecurity firms, has been traced back to a compromise…

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea
08
Sep
2025

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea

Microsoft’s Azure cloud platform is facing significant disruptions after multiple undersea fiber optic cables were severed in the Red Sea….

Apache Jackrabbit Exposes Systems To Arbitrary Code Execution Attacks
08
Sep
2025

Apache Jackrabbit Exposes Systems To Arbitrary Code Execution Attacks

An important security vulnerability has been discovered in Apache Jackrabbit, a popular open-source content repository used in enterprise content management…

How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach
08
Sep
2025

How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach

After a security breach, forensic investigators work quickly to follow the attacker’s trail. Security experts have analyzed this situation and…

U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China
08
Sep
2025

U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China

U.S. federal authorities have launched an investigation into a sophisticated malware campaign that targeted sensitive trade negotiations between Washington and…

Australian Authorities Uncovered Activities and Careers of Ransomware Criminal Groups
08
Sep
2025

Australian Authorities Uncovered Activities and Careers of Ransomware Criminal Groups

Ransomware has emerged as one of the most devastating cybercrime threats in the contemporary digital landscape, with criminal organizations operating…

Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
08
Sep
2025

Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data

The notorious Lazarus APT group has evolved its attack methodology by incorporating the increasingly popular ClickFix social engineering technique to…

Google News
06
Sep
2025

Critical Argo CD API Vulnerability Exposes Repository Credentials

A critical vulnerability has been discovered in Argo CD that allows API tokens with limited permissions to access sensitive repository…

"GPUGate" Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
06
Sep
2025

“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

A sophisticated malware campaign, dubbed “GPUGate,” abuses Google Ads and GitHub’s repository structure to trick users into downloading malicious software….