Category: CyberSecurityNews

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File
24
Jun
2025

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File

Summary 1. A high-severity flaw (CVE-2025-6218) in WinRAR allows attackers to execute arbitrary code by exploiting how the software handles…

North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands
24
Jun
2025

North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands

A sophisticated cybercriminal campaign has emerged targeting professionals through meticulously crafted fake Zoom applications designed to execute system takeover commands….

WhatsApp Banned on U.S. House Staffers Devices Due to Potential Security Risks
24
Jun
2025

WhatsApp Banned on U.S. House Staffers Devices Due to Potential Security Risks

Summary 1. The U.S. House Chief Administrative Officer banned WhatsApp from all government-issued devices used by congressional staffers, including mobile,…

LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly
24
Jun
2025

LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly

A sophisticated China-linked cyber espionage campaign has emerged, targeting over 1,000 Small Office/Home Office (SOHO) devices worldwide through an advanced…

Notepad++ Vulnerability Let Attacker Gains Complete System Control
24
Jun
2025

Notepad++ Vulnerability Let Attacker Gains Complete System Control

A severe privilege escalation vulnerability has been discovered in Notepad++ version 8.8.1, potentially exposing millions of users worldwide to complete…

24
Jun
2025

Notepad++ Vulnerability Let Attacker Gains Complete System Control

A severe privilege escalation vulnerability has been discovered in Notepad++ version 8.8.1, potentially exposing millions of users worldwide to complete…

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls
23
Jun
2025

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls

Summary 1. CVE-2025-49825 allows attackers to remotely bypass Teleport’s authentication controls, affecting multiple versions of the secure access platform. 2. Teleport…

1inch rolls out expanded bug bounties with rewards up to $500K
23
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts, wallet and infrastructure. A community-first approach to…

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References
23
Jun
2025

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References

Summary 1. Harmful Objective Concealed: Attacker defines a harmful goal but starts with benign prompts. 2. Context Poisoning: Introduces subtle…

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
23
Jun
2025

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague

The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL Conference 2025, taking place October 7–9, 2025, at the Vienna…

McLaren Health Care Data Breach Exposes 743,000 People Personal Information
23
Jun
2025

McLaren Health Care Data Breach Exposes 743,000 People Personal Information

McLaren Health Care, a major healthcare organization based in Grand Blanc, Michigan, has disclosed a significant data breach that compromised…

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs
23
Jun
2025

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs

This comprehensive guide provides SOC analysts and MSSP teams with practical threat hunting techniques using advanced threat intelligence platforms. Modern…