Category: CyberSecurityNews

Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials
21
Aug
2025

Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials

In recent weeks, the cybersecurity community has witnessed the rapid emergence of Warlock, a novel ransomware strain that weaponizes unpatched…

Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information
21
Aug
2025

Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information

Cybersecurity researchers have observed a surge in phishing campaigns leveraging QR codes to deliver malicious payloads. This emerging threat, often…

Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth
21
Aug
2025

Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth

A stealthy campaign emerged in early March 2025 that capitalized on a critical remote code execution flaw in GeoServer (CVE-2024-36401)…

Threat Actors Abuse AI Website Creation App to Deliver Malware
21
Aug
2025

Threat Actors Abuse AI Website Creation App to Deliver Malware

Cybercriminals have discovered a new avenue for malicious activities by exploiting Lovable, an AI-powered website creation platform, to develop sophisticated…

Internet Archive Abused for Hosting Stealthy JScript Loader Malware
21
Aug
2025

Internet Archive Abused for Hosting Stealthy JScript Loader Malware

Security researchers have uncovered a novel malware delivery chain in recent weeks that leverages the Internet Archive’s legitimate infrastructure to…

New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack
21
Aug
2025

New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack

A critical pre-handshake vulnerability in the LSQUIC QUIC implementation that allows remote attackers to crash servers through memory exhaustion attacks. …

Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy
21
Aug
2025

Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy

Cybersecurity researchers have uncovered a sophisticated new threat campaign that leverages a seemingly legitimate PDF editor application to transform infected…

FBI Warns of Russian Government Hackers Attacking Networking Devices of Critical Infrastructure
21
Aug
2025

FBI Warns of Russian Government Hackers Attacking Networking Devices of Critical Infrastructure

The Federal Bureau of Investigation has issued a critical security alert regarding sophisticated cyber operations conducted by Russian Federal Security…

UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware
21
Aug
2025

UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware

A sophisticated cybercrime operation has emerged, targeting unsuspecting internet users through a deceptive social engineering technique that exploits one of…

New SHAMOS Malware Attacking macOS Via Fake Help Websites to Steal Login Credentials
21
Aug
2025

New SHAMOS Malware Attacking macOS Via Fake Help Websites to Steal Login Credentials

A sophisticated malware campaign targeting macOS users has emerged between June and August 2025, successfully attempting to compromise over 300…

CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits
21
Aug
2025

CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits

CISA issued four comprehensive Industrial Control Systems (ICS) advisories on August 19, 2025, highlighting serious vulnerabilities affecting critical infrastructure sectors…

New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain
21
Aug
2025

New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain

A sophisticated attack chain that combines MITM6 with NTLM relay techniques to achieve full Active Directory domain compromise.  The attack…