Category: CyberSecurityNews

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
16
Aug
2025

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

Security researchers have uncovered four serious vulnerabilities in ImageMagick, one of the world’s most widely used open-source image processing software…

Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access
16
Aug
2025

Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access

A sophisticated social engineering campaign by the EncryptHub threat group that combines impersonation tactics with technical exploitation to compromise corporate…

Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256)
16
Aug
2025

Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256)

Cybersecurity researchers from watchTowr Labs have published a comprehensive technical analysis of a critical pre-authentication command injection vulnerability affecting Fortinet…

Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
16
Aug
2025

Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst

Palo Alto Networks has published an extensive malware analysis tutorial detailing the dissection of a sophisticated .NET-based threat that delivers…

Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection
16
Aug
2025

Ransomware Actors Blending Legitimate Tools with Custom Malware to Evade Detection

The cybersecurity landscape faces a new sophisticated threat as the Crypto24 ransomware group demonstrates an alarming evolution in attack methodology,…

Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities
15
Aug
2025

Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities

Google Play has implemented comprehensive licensing requirements for cryptocurrency exchanges and software wallets, fundamentally reshaping the mobile app ecosystem for…

Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS
15
Aug
2025

Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS

A sophisticated threat campaign has emerged that leverages CrossC2, an unofficial extension tool that expands Cobalt Strike’s notorious capabilities beyond…

New Clever Phishing Attack Uses Japanese Character "ん" to Mimic Forward Slash
15
Aug
2025

New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash

Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking…

New NFC-Driven PhantomCard Android Malware Attacking Banking Users
15
Aug
2025

New NFC-Driven PhantomCard Android Malware Attacking Banking Users

A sophisticated new Android malware dubbed PhantomCard has emerged from the shadows of Brazil’s cybercriminal underground, representing a significant evolution…

2025-8088 - WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware
15
Aug
2025

2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware

A zero-day vulnerability in WinRAR allows malware to be deployed on unsuspecting users’ systems, highlighting the ongoing threats to popular…

15
Aug
2025

2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware

A zero-day vulnerability in WinRAR allows malware to be deployed on unsuspecting users’ systems, highlighting the ongoing threats to popular…

HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap
15
Aug
2025

HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap

A new AI tool named HexStrike AI has been launched, designed to bridge the gap between large language models (LLMs)…