Category: CyberSecurityNews

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution
23
Dec
2025

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution

Security researchers have released a Proof-of-Concept (PoC) exploit for a critical vulnerability in HPE OneView, a popular IT infrastructure management…

Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios
23
Dec
2025

Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios

A comprehensive analysis of CVE-2025-50165, a critical Windows vulnerability affecting the Windows Imaging Component (WIC). That could potentially enable remote…

Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware
23
Dec
2025

Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors impersonate writers from major Korean broadcasting networks to distribute malicious…

University of Phoenix Data Breach
23
Dec
2025

University of Phoenix Data Breach

University of Phoenix, one of the largest for-profit educational institutions in the United States, disclosed a significant data breach affecting…

HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
23
Dec
2025

HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access

HardBit ransomware continues to evolve as a serious threat to organizations worldwide. The latest version, HardBit 4.0, emerged as an…

Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain
23
Dec
2025

Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Cybercriminals have increasingly weaponized the Income Tax Return (ITR) filing season to orchestrate sophisticated phishing campaigns targeting Indian businesses. By…

Critical n8n Automation Platform Vulnerability Enables RCE Attacks
23
Dec
2025

Critical n8n Automation Platform Vulnerability Enables RCE Attacks

A critical remote code execution vulnerability has been discovered in n8n, the open-source workflow automation platform, exposing over 103,000 potentially…

New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps
23
Dec
2025

New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

A new version of MacSync Stealer malware is targeting macOS users through digitally signed and notarized applications, marking a major…

New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR
23
Dec
2025

New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR

A new tool named GhostLocker has been released, demonstrating a novel technique to neutralize Endpoint Detection and Response (EDR) systems…

Hackers Using ClickFix Technique to Hide Images within the Image Files
23
Dec
2025

Hackers Using ClickFix Technique to Hide Images within the Image Files

Threat actors have evolved their attack strategies by combining the deceptive ClickFix social engineering lure with advanced steganography techniques to…

Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials
23
Dec
2025

Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Two fake Chrome extensions named “Phantom Shuttle” are deceiving thousands of users by posing as legitimate VPN services while secretly…

Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan
23
Dec
2025

Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan

Researchers at Ontinue’s Cyber Defense Center have uncovered a significant threat as attackers exploit Nezha, a legitimate open-source server monitoring…