Category: CyberSecurityNews

PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request
08
Jul
2025

PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Security researchers have released proof-of-concept exploits for a critical vulnerability dubbed “CitrixBleed2” affecting Citrix NetScaler ADC and Gateway products.  The…

SAP’s July 2025 Patch Day
08
Jul
2025

SAP’s July 2025 Patch Day

SAP has released its July 2025 Security Patch Day update, addressing a significant number of vulnerabilities across its enterprise software…

CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks
08
Jul
2025

CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks

Key Takeaways1. CVE-2016-10033 in PHPMailer allows attackers to execute arbitrary code through command injection in the mail() function.2. The vulnerability…

Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence
08
Jul
2025

Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence

The notorious Atomic macOS Stealer (AMOS) malware has received a dangerous upgrade that significantly escalates the threat to Mac users…

Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results
08
Jul
2025

Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results

A sophisticated SEO poisoning campaign targeting system administrators with malicious backdoor malware. Arctic Wolf security researchers have uncovered a dangerous…

BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery
08
Jul
2025

BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery

New ransomware group employs advanced virtualization attack tactics to maximize damage and hinder organizational recovery efforts. A newly emerged ransomware…

Researchers Expose Scattered Spider's Tools, Techniques and Key Indicators
08
Jul
2025

Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators

Scattered Spider’s phishing domain patterns provide actionable insights to proactively counter threats from the notorious cyber group responsible for recent…

New Linux EDR Evasion Tool Using io_uring Kernel Feature
07
Jul
2025

New Linux EDR Evasion Tool Using io_uring Kernel Feature

A sophisticated new Linux evasion tool called RingReaper has emerged, leveraging the legitimate io_uring kernel feature to bypass modern Endpoint…

Linux Boot Vulnerability Allows Bypass of Secure Boot Protections on Modern Linux Systems
07
Jul
2025

Linux Boot Vulnerability Allows Bypass of Secure Boot Protections on Modern Linux Systems

A significant vulnerability affecting modern Linux distributions that allows attackers with brief physical access to bypass Secure Boot protections through…

1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers
07
Jul
2025

1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers

As Amazon Prime Day 2025 approaches on July 8-11, millions of eager shoppers are preparing their wish lists and hunting…

Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows
07
Jul
2025

Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows

Cybercriminals are increasingly exploiting legitimate Windows driver signing processes to deploy sophisticated kernel-level malware, with new research revealing a concerning…

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users
07
Jul
2025

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users

Security researchers from the Socket Threat Research Team have uncovered a sophisticated network of eight malicious Firefox browser extensions that…