Category: CyberSecurityNews

NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems
29
Aug
2025

NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems

Since its emergence in February 2025, the NightSpire ransomware group has rapidly distinguished itself through a sophisticated double-extortion strategy that…

New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data
29
Aug
2025

New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data

In June 2025, a previously undocumented campaign leveraging end-of-support software began surfacing in telemetry data gathered across Eastern Asia. Dubbed…

Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware
29
Aug
2025

Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware

A sophisticated ransomware attack has emerged targeting organizations through compromised third-party managed service provider (MSP) credentials, showcasing the evolving tactics…

Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens
29
Aug
2025

Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens

Google has confirmed that a security breach involving the Salesloft Drift platform is more extensive than initially reported, potentially compromising…

DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs
29
Aug
2025

DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs

Over the past year, security researchers have observed a growing trend of North Korean–linked developers establishing credible-looking profiles on popular…

Threat Actors Weaponizing Facebook Ads with Free TradingView Premium App Lures That Delivers Android Malware
29
Aug
2025

Threat Actors Weaponizing Facebook Ads with Free TradingView Premium App Lures That Delivers Android Malware

Cybersecurity researchers have uncovered a sophisticated malvertising campaign on Meta’s Facebook platform in recent weeks that targets Android users with…

New Research With PoC Explains Security Nightmares On Coding Using LLMs
29
Aug
2025

New Research With PoC Explains Security Nightmares On Coding Using LLMs

Security researchers have uncovered significant vulnerabilities in code generated by Large Language Models (LLMs), demonstrating how “vibe coding” with AI…

PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input
29
Aug
2025

PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input

A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in the widely used PhpSpreadsheet library, potentially allowing attackers to…

How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?
29
Aug
2025

How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?

Adversary-in-the-Middle (AiTM) attacks are among the most sophisticated and dangerous phishing techniques in the modern cybersecurity landscape. Unlike traditional phishing…

New Mac Malware Dubbed 'JSCoreRunner' Weaponizing PDF Conversion Site to Deliver Malware
29
Aug
2025

New Mac Malware Dubbed ‘JSCoreRunner’ Weaponizing PDF Conversion Site to Deliver Malware

A sophisticated new Mac malware campaign has emerged, targeting users through a deceptive PDF conversion website that conceals a dangerous…

Nx Packages With Millions of Weekly Downloads Hacked With Credential Stealer Malware
29
Aug
2025

Nx Packages With Millions of Weekly Downloads Hacked With Credential Stealer Malware

A sophisticated supply chain attack has compromised the popular Nx build platform, affecting millions of weekly downloads and resulting in…

Hackers Exploit Microsoft Teams, Mimicking an IT Help Desk for Screen Sharing and Remote Access
29
Aug
2025

Hackers Exploit Microsoft Teams, Mimicking an IT Help Desk for Screen Sharing and Remote Access

A sophisticated phishing campaign has been identified, where threat actors impersonate IT helpdesk personnel through Teams’ external communication features, exploiting…