Category: CyberSecurityNews

20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes
15
Jul
2025

20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes

CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to…

Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
14
Jul
2025

Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools

Microsoft has provided comprehensive guidance for resolving the common Windows error “The process cannot access the file because it is…

Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
14
Jul
2025

Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment

Critical security vulnerabilities have been discovered in Gigabyte UEFI firmware that could allow attackers to execute arbitrary code in System…

Wing FTP Server Vulnerability Actively Exploited
14
Jul
2025

Wing FTP Server Vulnerability Actively Exploited

Security researchers have confirmed active exploitation of a critical vulnerability in Wing FTP Server, just one day after technical details…

Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
14
Jul
2025

Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

A sophisticated malware campaign targeting Generation Z gamers has emerged, leveraging weaponized versions of popular games to infiltrate gaming communities…

Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App
14
Jul
2025

Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App

A former U.S. Air Force employee has pleaded guilty to charges of sharing classified military information about Russia’s war in…

KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique
14
Jul
2025

KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique

A sophisticated malware campaign leveraging the KongTuke threat cluster has emerged, targeting Windows users through a novel FileFix technique that…

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP
14
Jul
2025

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP

Cybersecurity researchers have developed innovative forensic methods to track sophisticated attackers who exploit Remote Desktop Protocol (RDP) for lateral movement…

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
14
Jul
2025

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction

A sophisticated zero-click attack methodology called RenderShock that exploits passive file preview and indexing behaviors in modern operating systems to…

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack
14
Jul
2025

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

A Pune-based automobile parts manufacturer fell victim to a sophisticated man-in-the-middle (MITM) cyber attack, resulting in a loss of ₹2.35…

Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
14
Jul
2025

Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure

Threat actors have escalated their campaigns from crude ransomware splashes to precision-engineered strikes that can cripple an organisation’s very lifeblood—its…

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
14
Jul
2025

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload

A malicious Microsoft Compiled HTML Help (CHM) file uploaded from Poland on 30 June 2025 has shown how a legacy…