Category: CyberSecurityNews

Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
04
Jul
2025

Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks

A critical security vulnerability has been discovered in HIKVISION’s applyCT component, part of the HikCentral Integrated Security Management Platform, that…

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique
04
Jul
2025

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique

A sophisticated technique to bypass Content Security Policy (CSP) protections using a combination of HTML injection and browser cache manipulation. …

New "123 | Stealer" Advertised on Underground Hacking Forums for $120 Per Month
04
Jul
2025

New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month

A new credential-stealing malware dubbed “123 | Stealer” has surfaced on underground cybercrime forums, being marketed by threat actor “koneko”…

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
04
Jul
2025

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware

A sophisticated social engineering campaign has emerged targeting unsuspecting users through fraudulent Cloudflare verification screens, representing a new evolution in…

Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365
04
Jul
2025

Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365

A dramatic surge in password spray attacks targeting enterprise infrastructure, with Cisco ASA VPN systems experiencing an unprecedented 399% increase…

New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
04
Jul
2025

New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks

A sophisticated new botnet family has emerged in the cybersecurity landscape, demonstrating unprecedented innovation in malware design and attack methodologies….

Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
04
Jul
2025

Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Microsoft Azure’s role-based access control system has been found to contain critical security vulnerabilities that could expose enterprise networks to…

Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code
03
Jul
2025

Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code

Two high-severity vulnerabilities in Anthropic’s Model Context Protocol (MCP) Filesystem Server enable attackers to escape sandbox restrictions and execute arbitrary…

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
03
Jul
2025

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Critical vulnerabilities in Apache Tomcat and Apache Camel are being actively exploited by cybercriminals worldwide, with security researchers documenting over…

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
03
Jul
2025

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

The .COM top-level domain continues to dominate the cybercriminal landscape as the primary vehicle for hosting credential phishing websites, maintaining…

03
Jul
2025

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

The .COM top-level domain continues to dominate the cybercriminal landscape as the primary vehicle for hosting credential phishing websites, maintaining…

Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
03
Jul
2025

Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Citrix has issued an urgent advisory warning customers of widespread authentication failures following recent updates to NetScaler builds 14.1.47.46 and…