Category: CyberSecurityNews

ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access
07
Jul
2025

ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access

Two critical vulnerabilities in ScriptCase’s Production Environment module can be chained together to achieve pre-authenticated remote command execution on affected…

NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
07
Jul
2025

NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware

A sophisticated APT group dubbed “NightEagle” (APT-Q-95) has been conducting targeted attacks against China’s critical technology sectors since 2023.  The…

APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data
07
Jul
2025

APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data

Pakistan-based threat actor APT36, also known as Transparent Tribe, has significantly evolved its cyber-espionage capabilities by launching a sophisticated campaign…

PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev
07
Jul
2025

PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev

A proof-of-concept exploit for a critical local privilege escalation vulnerability affecting major Linux distributions, including Fedora and SUSE environments. The…

New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data
05
Jul
2025

New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data

A sophisticated phishing campaign targeting UK citizens has emerged, masquerading as official communications from the Department for Work and Pensions…

Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass
05
Jul
2025

Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass

A significant security vulnerability has been discovered in Lenovo’s preloaded Windows operating systems, where a writable file in the Windows…

Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily
05
Jul
2025

Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily

Instagram has adopted an unprecedented approach to web security by implementing daily rotation of TLS certificates that maintain validity periods…

"CitrixBleed 2" Vulnerability PoC Released
05
Jul
2025

“CitrixBleed 2” Vulnerability PoC Released

Critical flaw in Citrix NetScaler devices echoes infamous 2023 security breach that crippled major organizations worldwide. The new critical vulnerability…

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
05
Jul
2025

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

Russian Federal Security Service (FSB) officers have detained two hackers in Siberia who conducted cyberattacks on critical infrastructure facilities under…

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
05
Jul
2025

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone

Cybercriminals are exploiting the economic uncertainty and remote work trends to orchestrate sophisticated employment fraud schemes, with victims losing over…

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses
05
Jul
2025

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses

XWorm has emerged as one of the most versatile and actively distributed remote access trojans in the current threat landscape,…

Threat Actors Abused AV - EDR Evasion Framework In-The-Wild to Deploy Malware Payloads
05
Jul
2025

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Cybersecurity researchers have uncovered a concerning development as malicious actors began exploiting SHELLTER, a commercial anti-virus and endpoint detection response…