Category: CyberSecurityNews

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System
05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

A critical vulnerability in SAP S/4HANA is being actively exploited in the wild, allowing attackers with low-level user access to…

05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

A critical vulnerability in SAP S/4HANA is being actively exploited in the wild, allowing attackers with low-level user access to…

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks
05
Sep
2025

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks

CISA has issued an urgent alert regarding a zero-day vulnerability in the Android operating system that is being actively exploited…

05
Sep
2025

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

A critical, zero-click vulnerability that allows attackers to hijack online accounts by exploiting how web applications handle international email addresses….

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework
05
Sep
2025

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Cybersecurity researchers have identified a sophisticated new command-and-control framework that exploits legitimate Google Calendar APIs to establish covert communication channels…

New NightshadeC2 Botnet Uses 'UAC Prompt Bombing' to Bypass Windows Defender Protections
05
Sep
2025

New NightshadeC2 Botnet Uses ‘UAC Prompt Bombing’ to Bypass Windows Defender Protections

Security teams began observing a novel botnet strain slipping beneath the radar of standard Windows Defender defenses in early August…

Hackers May Leverage Raw Disk Reads to Bypass EDR Solutions and Access Highly Sensitive Files
05
Sep
2025

Hackers May Leverage Raw Disk Reads to Bypass EDR Solutions and Access Highly Sensitive Files

A new technique that allows attackers to read highly sensitive files on Windows systems, bypassing many of the modern security…

Colombian Malware Weaponizing SWF and SVG to Bypass Detection
05
Sep
2025

Colombian Malware Weaponizing SWF and SVG to Bypass Detection

A previously unseen malware campaign began circulating in early August 2025, through email attachments and web downloads, targeting users in…

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges
05
Sep
2025

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges

A recently patched vulnerability in a core Windows driver could allow a local attacker to execute code with the highest…

Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs
05
Sep
2025

Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs

An unprecedented surge in malicious scanning activity targeting Cisco Adaptive Security Appliances (ASAs) occurred in late August 2025, with over…

Chess.com Data Breach - Hackers Breached External Systems and Gained Internal Access
04
Sep
2025

Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access

Online chess giant Chess.com has disclosed a data breach that compromised the personal information of 4,541 individuals, according to a filing with the…

Tycoon Phishing Kit Employs New Technique to Hide Malicious Links
04
Sep
2025

Tycoon Phishing Kit Employs New Technique to Hide Malicious Links

Cybercriminals are deploying increasingly sophisticated methods to bypass security systems, with the latest threat emerging from the advanced Tycoon phishing-as-a-service…