Category: CyberSecurityNews

Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data
21
Aug
2025

Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data

A critical security vulnerability has been discovered in Apache Tika’s PDF parser module that could enable attackers to access sensitive…

Google Announces New Capabilities for Enabling Defenders and Securing AI Innovation
21
Aug
2025

Google Announces New Capabilities for Enabling Defenders and Securing AI Innovation

Google Cloud has unveiled a comprehensive suite of security enhancements at its Security Summit 2025, marking a significant evolution in…

New Loader Malware Dubbed 'QuirkyLoader' Delivering Infostealers and RATs
21
Aug
2025

New Loader Malware Dubbed ‘QuirkyLoader’ Delivering Infostealers and RATs

A sophisticated new malware loader called QuirkyLoader has emerged as a significant cybersecurity threat, actively distributing well-known infostealers and remote…

Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times
21
Aug
2025

Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times

Japan experienced a significant surge in ransomware attacks during the first half of 2025, with incidents increasing by approximately 1.4…

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild
21
Aug
2025

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild

Apple yesterday released emergency security updates for iOS and iPadOS to patch a critical zero-day vulnerability in its core Image…

Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
20
Aug
2025

Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines

A critical security flaw in Lenovo’s AI chatbot “Lena” has been discovered that allows attackers to execute malicious scripts on…

How Businesses Stop Complex Social Engineering Attacks Early
20
Aug
2025

How Businesses Stop Complex Social Engineering Attacks Early

Attackers have leveled up. Powered by AI and professional-grade toolkits, today’s social engineering scams are nearly impossible to tell apart…

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
20
Aug
2025

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins

A novel and highly tricky phishing campaign is actively stealing Microsoft 365 credentials by exploiting Microsoft’s own Active Directory Federation…

A Free Zero Trust Web Application Firewall for 2026
20
Aug
2025

A Free Zero Trust Web Application Firewall for 2026

Every type of organization—whether it’s a multinational giant with thousands of employees or a single tech enthusiast running a homelab—needs…

Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
20
Aug
2025

Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Link11, a Germany-based global IT security provider, has released insights into the evolving cybersecurity threat landscape and announced the capabilities…

Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
20
Aug
2025

Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function

Git 2.51.0 has been officially released after an accelerated 8-week development cycle, introducing significant performance improvements and security enhancements that…

Okta Security Releases Auth0 Event Logs for Proactive Threat Detection
20
Aug
2025

Okta Security Releases Auth0 Event Logs for Proactive Threat Detection

Okta has announced the launch of the Auth0 Customer Detection Catalog, a comprehensive open-source repository designed to enhance proactive threat…