Category: CyberSecurityNews

NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation
27
Aug
2025

NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation

NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow attackers…

How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses
27
Aug
2025

How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses

August 2025 has marked a significant evolution in cybercrime tactics, with threat actors deploying increasingly sophisticated phishing frameworks and social…

28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
27
Aug
2025

28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild

A critical zero-day remote code execution (RCE) vulnerability, tracked as CVE-2025-7775, is affecting over 28,000 Citrix instances worldwide. The flaw…

PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
27
Aug
2025

PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)

A weaponized proof-of-concept exploit has been publicly released targeting CVE-2025-54309, a severe authentication bypass vulnerability affecting CrushFTP file transfer servers. …

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
27
Aug
2025

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript

A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi).  Tracked as CVE-2025-50975, the vulnerability allows…

CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
27
Aug
2025

CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits

CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical vulnerabilities affecting widely-deployed…

New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
27
Aug
2025

New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks

BruteForceAI, an innovative penetration testing framework developed by Mor David, integrates large language models (LLMs) with browser automation to autonomously…

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
27
Aug
2025

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression

A newly observed variant of the Zip Slip vulnerability has emerged, enabling threat actors to exploit path traversal flaws in…

Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated?
27
Aug
2025

Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated?

Spotify today rolled out a native direct messaging feature, Messages, for both Free and Premium users aged 16+ in select…

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
27
Aug
2025

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell

In recent weeks, a sophisticated phishing operation known as the ZipLine campaign has targeted U.S.-based manufacturing firms, leveraging supply-chain criticality…

DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
27
Aug
2025

DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment

A whistleblower disclosure filed today alleges that the Department of Government Efficiency (DOGE) within the Social Security Administration (SSA) covertly…

New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access
27
Aug
2025

New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access

A newly identified ransomware strain named Cephalus has emerged as a sophisticated threat, targeting organizations through compromised Remote Desktop Protocol…