Category: CyberSecurityNews

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code
12
Jun
2025

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code

Multiple critical security vulnerabilities in the Trend Micro Apex One enterprise security platform could enable attackers to inject malicious code and escalate…

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User
12
Jun
2025

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User

A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall…

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack

A critical zero-day vulnerability affecting Windows systems that allows attackers to achieve privilege escalation through a novel Reflective Kerberos Relay…

CISA Releases Guide to Protect Network Edge Devices From Hackers
12
Jun
2025

CISA Releases Guide to Protect Network Edge Devices From Hackers

CISA and international cybersecurity partners have released a comprehensive suite of guidance documents aimed at protecting critical network edge devices…

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums
12
Jun
2025

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums

A sophisticated new threat platform, Nytheon AI, has emerged, which combines multiple uncensored large language models (LLMs) built specifically for…

Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams
12
Jun
2025

Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams

A critical zero-click vulnerability in Microsoft 365 Copilot, dubbed “EchoLeak,” enables attackers to automatically exfiltrate sensitive organizational data without requiring…

ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM
12
Jun
2025

ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM

The urgency stems from requirements imposed by technology partners, which necessitated an accelerated timeline for implementation across all affected products….

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled
12
Jun
2025

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled

More than 20,000 malicious IP addresses and domains linked to information stealers have been taken down in an INTERPOL-coordinated operation…

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
11
Jun
2025

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Multiple critical vulnerabilities in Microsoft Office could allow attackers to execute arbitrary code on affected systems.  The vulnerabilities, tracked as…

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges
11
Jun
2025

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability in the Windows Common Log File System Driver (CLFS) enables attackers to escalate their privileges to…

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries
11
Jun
2025

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries

A sophisticated wave of Linux malware campaigns is targeting cloud environments with increasing frequency and complexity, posing significant threats to…

FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes
11
Jun
2025

FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes

A sophisticated cybercrime campaign has emerged where threat actors are exploiting the trust inherent in professional recruitment processes, transforming routine…