Category: CyberSecurityNews

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab
26
Aug
2025

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Aembit, the workload identity and access management (IAM) company, today announced new capabilities for GitLab designed to reduce the security…

Hackers Can Exploit Image Scaling in Gemini CLI, Google Assistant to Exfiltrate Sensitive Data
26
Aug
2025

Hackers Can Exploit Image Scaling in Gemini CLI, Google Assistant to Exfiltrate Sensitive Data

Hackers can weaponize hidden prompts revealed by downscaled images to trigger sensitive tool actions and achieve data exfiltration in Gemini CLI—and similar…

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems
26
Aug
2025

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems

In August 2025, researchers at George Mason University published a groundbreaking study at the 34th USENIX Security Symposium, introducing OneFlip,…

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers
26
Aug
2025

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers

The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR,…

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
26
Aug
2025

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild

Google has disclosed a critical zero-day vulnerability in the V8 JavaScript engine used by Chrome, tracked as CVE-2025-5419.  Before a…

French Retailer Auchan Cyberattack  - Thousands of Customers Personal Data Exposed
26
Aug
2025

French Retailer Auchan Cyberattack  – Thousands of Customers Personal Data Exposed

Major French retail chain Auchan announced on August 21, 2025, that it suffered a significant cybersecurity incident resulting in the…

X/Twitter The Most Aggressive Social Media App Collecting Users Location Information
26
Aug
2025

X/Twitter The Most Aggressive Social Media App Collecting Users Location Information

A comprehensive analysis of the top 10 social media platforms reveals that X (formerly Twitter) stands out as the most…

Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services
26
Aug
2025

Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services

A malvertising campaign using sponsored results on Microsoft’s search platform delivered a weaponized PuTTY that established persistence, enabled hands-on keyboard…

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
26
Aug
2025

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof

Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary…

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection

A stealthy espionage campaign emerged in early 2025 targeting diplomats and government entities in Southeast Asia and beyond. At the…

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s
26
Aug
2025

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s

A massive coordinated scanning campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with threat actors deploying over 30,000 unique IP…

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets
25
Aug
2025

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets

A critical security vulnerability has been discovered in Zendesk’s Android SDK implementation that allows attackers to perform mass account takeovers…