Category: CyberSecurityNews

Hundreds of Wordpress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
14
Jun
2025

Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services

A sophisticated cybercriminal enterprise known as VexTrio has orchestrated one of the most extensive WordPress compromise campaigns ever documented, hijacking…

Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
14
Jun
2025

Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access

A security researcher has published a detailed analysis demonstrating how Kernel Address Space Layout Randomization (KASLR) protections can be circumvented…

AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
14
Jun
2025

AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods

A sophisticated new variant of the AMOS macOS stealer has emerged, demonstrating unprecedented levels of technical sophistication in its distribution…

Tenable Agent for Windows Vulnerability Let Attackers Login as Admin to Delete The System Files
14
Jun
2025

Tenable Agent for Windows Vulnerability Let Attackers Login as Admin to Delete The System Files

Tenable, a prominent cybersecurity provider, has released version 10.8.5 of its Agent software to address three critical security vulnerabilities affecting…

Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
14
Jun
2025

Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages

The cryptocurrency and blockchain development ecosystem is facing an unprecedented surge in sophisticated malware campaigns targeting the open source supply…

New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change
13
Jun
2025

New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change

A critical vulnerability that allows attackers to bypass AI-powered content moderation systems using minimal text modifications.  The “TokenBreak” attack demonstrates…

China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
13
Jun
2025

China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure

Cross-strait tensions have escalated into a new domain as China and Taiwan engage in unprecedented mutual accusations of cyberwarfare targeting…

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User
13
Jun
2025

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User

A severe security vulnerability has been discovered in the Acer Control Center software, which could allow attackers to execute arbitrary…

Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions
13
Jun
2025

Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions

Microsoft 365 users across Asia Pacific, Europe, the Middle East, and Africa are experiencing significant authentication disruptions that are preventing…

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
13
Jun
2025

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the release of its new Vishing Simulation…

Kali Linux 2025.2 Released With New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
13
Jun
2025

Kali Linux 2025.2 Released With New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools

The penetration testing community has received a significant upgrade with the release of Kali Linux 2025.2, marking another milestone in…

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection
13
Jun
2025

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection

Despite sustained international pressure, sanctions, and public exposures over the past two years, the sophisticated Predator mobile spyware has demonstrated…