Category: CyberSecurityNews

Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords
08
Jul
2025

Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords

Ivanti has identified and resolved three high-severity vulnerabilities in its Endpoint Manager (EPM) software. If exploited, these flaws could enable…

Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada
08
Jul
2025

Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada

ThreatFabric researchers have identified a sophisticated new campaign by the Anatsa banking trojan specifically targeting mobile banking customers across the…

FortiOS Buffer Overflow Vulnerability Allows Attackers to Execute Arbitrary Code
08
Jul
2025

FortiOS Buffer Overflow Vulnerability Allows Attackers to Execute Arbitrary Code

Fortinet disclosed a significant security flaw in its FortiOS operating system, identified as CVE-2025-24477. This heap-based buffer overflow vulnerability, classified…

CISA Warns of Zimbra Collaboration Suite (ZCS) Vulnerability Exploited in Attacks
08
Jul
2025

CISA Warns of Zimbra Collaboration Suite (ZCS) Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding a critical vulnerability in Synacor’s Zimbra Collaboration Suite (ZCS) that is being actively…

macOS SMBClient Vulnerability Allows Remote Code Execution and Kernel Crash
08
Jul
2025

macOS SMBClient Vulnerability Allows Remote Code Execution and Kernel Crash

Multiple vulnerabilities in macOS SMBClient that could allow attackers to execute arbitrary code remotely and crash systems.  The vulnerabilities affecting…

Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites
08
Jul
2025

Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites

Security researchers have uncovered a sophisticated cyberattack campaign leveraging compromised WordPress websites to distribute the NetSupport Remote Access Trojan through…

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google's Verified Badges
08
Jul
2025

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

A sophisticated malware campaign has infected over 1.7 million Chrome users through eleven seemingly legitimate browser extensions, all of which…

PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request
08
Jul
2025

PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Security researchers have released proof-of-concept exploits for a critical vulnerability dubbed “CitrixBleed2” affecting Citrix NetScaler ADC and Gateway products.  The…

SAP’s July 2025 Patch Day
08
Jul
2025

SAP’s July 2025 Patch Day

SAP has released its July 2025 Security Patch Day update, addressing a significant number of vulnerabilities across its enterprise software…

CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks
08
Jul
2025

CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks

Key Takeaways1. CVE-2016-10033 in PHPMailer allows attackers to execute arbitrary code through command injection in the mail() function.2. The vulnerability…

Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence
08
Jul
2025

Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence

The notorious Atomic macOS Stealer (AMOS) malware has received a dangerous upgrade that significantly escalates the threat to Mac users…

Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results
08
Jul
2025

Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results

A sophisticated SEO poisoning campaign targeting system administrators with malicious backdoor malware. Arctic Wolf security researchers have uncovered a dangerous…