Category: CyberSecurityNews

Chinese Houken Hackers Exploiting Ivanti CSA Zero-Days to Deploy Linux Rootkits
02
Jul
2025

Chinese Houken Hackers Exploiting Ivanti CSA Zero-Days to Deploy Linux Rootkits

A sophisticated Chinese threat group identified as Houken has been exploiting multiple zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA)…

Qantas Airlines Hit by Cyberattack, Customer Data Compromised
02
Jul
2025

Qantas Airlines Hit by Cyberattack, Customer Data Compromised

Australia’s flagship carrier, Qantas Airways, has disclosed a significant cybersecurity breach affecting up to 6 million customers, with cybercriminals gaining…

YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack
02
Jul
2025

YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack

A significant security flaw has been identified in the popular YONO SBI banking application that could potentially expose millions of…

Critical WordPress Plugin Vulnerability Exposes 600,000+ Sites to Remote Takeover
02
Jul
2025

Critical WordPress Plugin Vulnerability Exposes 600,000+ Sites to Remote Takeover

A severe arbitrary file deletion vulnerability has been discovered in the popular Forminator WordPress plugin, affecting over 600,000 active installations…

Critical Vulnerability in Anthropic MCP Inspector Let Attackers Execute Arbitrary Code
02
Jul
2025

Critical Vulnerability in Anthropic MCP Inspector Let Attackers Execute Arbitrary Code

A critical Remote Code Execution (RCE) vulnerability in Anthropic’s MCP Inspector tool, designated as CVE-2025-49596, has a severe CVSS score…

5 Asian Cities Where Cybersecurity Maturity Meets Innovation
02
Jul
2025

5 Asian Cities Where Cybersecurity Maturity Meets Innovation

Asia is not only a hub of economic and technological growth—it’s also a frontline battlefield for cybersecurity evolution. Across the…

TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections
02
Jul
2025

TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections

The cybersecurity landscape faces a renewed threat as TA829, a sophisticated threat actor group, has emerged with enhanced tactics, techniques,…

Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files
02
Jul
2025

Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files

A newly disclosed security advisory from Tenable reveals serious vulnerabilities in the Nessus vulnerability scanner that could enable attackers to…

FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection
02
Jul
2025

FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection

A sophisticated new variation of cyberattacks emerged in July 2025, exploiting a critical vulnerability in how Chrome and Microsoft Edge…

Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines
02
Jul
2025

Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines

The notorious North Korean threat group Kimsuky has adopted a sophisticated social engineering tactic known as “ClickFix” to deceive users…

New C4 Bomb Attack Bypasses Chrome’s AppBound Cookie Encryption
02
Jul
2025

New C4 Bomb Attack Bypasses Chrome’s AppBound Cookie Encryption

A critical vulnerability that allows low-privileged attackers to decrypt Chrome’s AppBound Cookie Encryption, a security feature Google introduced in July…

Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide
02
Jul
2025

Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide

European law enforcement agencies have successfully dismantled a sophisticated cryptocurrency investment fraud network that laundered EUR 460 million in illicit…