Category: CyberSecurityNews

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware
19
Aug
2025

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware

A sophisticated malware campaign has been identified, utilizing PipeMagic, a highly modular backdoor deployed by the financially motivated threat actor…

Crypto Developers Attacked With Malicious npm Packages to Steal Login Details
19
Aug
2025

Crypto Developers Attacked With Malicious npm Packages to Steal Login Details

A sophisticated new threat campaign has emerged targeting cryptocurrency developers through malicious npm packages designed to steal sensitive credentials and…

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
19
Aug
2025

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks

CISA has issued a critical warning regarding a high-severity OS command injection vulnerability in Trend Micro Apex One Management Console…

Hackers Weaponizing Cisco's Secure Links to Evade Link Scanning and By-Pass Network Filters
19
Aug
2025

Hackers Weaponizing Cisco’s Secure Links to Evade Link Scanning and By-Pass Network Filters

A sophisticated attack campaign uncovered where cybercriminals are weaponizing Cisco’s own security infrastructure to conduct phishing attacks.  The attackers are…

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware
19
Aug
2025

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting Microsoft Help Index Files (.mshi) to deliver the notorious PipeMagic backdoor,…

DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators
19
Aug
2025

DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators

The U.S. Department of Justice (DoJ) announced the seizure of over $2.8 million in cryptocurrency, $70,000 in cash, and a…

Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence
19
Aug
2025

Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence

A sophisticated supply chain attack targeting Python developers has emerged through a seemingly innocuous package named termncolor, which conceals a…

Threats Actors Using Telegram as The Communication Channel to Exfiltrate The Stolen Data
19
Aug
2025

Threats Actors Using Telegram as The Communication Channel to Exfiltrate The Stolen Data

Cybersecurity researchers have identified an alarming trend where threat actors are increasingly leveraging Telegram’s Bot API infrastructure as a covert…

Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed
19
Aug
2025

Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed

A sophisticated zero-day exploitation script targeting SAP systems has emerged in the cybersecurity landscape, demonstrating advanced remote code execution capabilities…

VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes
18
Aug
2025

VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes

Oracle has announced the release of VirtualBox 7.2, a major update to the popular open-source virtualization platform that introduces significant…

APT SideWinder Actor Profile - Recent Attacks, Tactics, Techniques, and Procedures
18
Aug
2025

APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures

APT SideWinder, also known as Rattlesnake, Razor Tiger, and T-APT-04, is a nation-state advanced persistent threat (APT) group active since…

Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data
18
Aug
2025

Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

A series of critical vulnerabilities across multiple internal Intel websites allowed for the complete exfiltration of the company’s global employee…