Category: CyberSecurityNews

Breaking Windows Out-of-Box-Experience to Gain Command Line Access to Windows Machine With Admin Privileges
14
Aug
2025

Breaking Windows Out-of-Box-Experience to Gain Command Line Access to Windows Machine With Admin Privileges

A new method has been identified to exploit Windows Out-of-Box-Experience (OOBE) that bypasses existing protections and grants administrative command line…

VexTrio Hackers Attacking Users via Fake CAPTCHA Robots and Malicious Apps into Google Play and App Store
14
Aug
2025

VexTrio Hackers Attacking Users via Fake CAPTCHA Robots and Malicious Apps into Google Play and App Store

A sophisticated cybercriminal organization known as VexTrio has been orchestrating a massive fraud empire through deceptive CAPTCHA robots and malicious…

Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
14
Aug
2025

Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network

Critical security vulnerabilities in Microsoft Exchange Server enable attackers to perform spoofing and tampering attacks over network connections.  The vulnerabilities…

GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
14
Aug
2025

GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise

A critical security vulnerability in GitHub Copilot and Visual Studio Code has been discovered that allows attackers to achieve remote…

Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
14
Aug
2025

Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation

GitLab has released emergency security patches addressing multiple critical vulnerabilities that could enable attackers to perform account takeovers and execute…

Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
14
Aug
2025

Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code

Microsoft is officially removing Windows PowerShell 2.0 from its operating systems, marking the end of an era for the legacy…

CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
13
Aug
2025

CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild

The U.S. Cybersecurity and Infrastructure Security Agency has added this vulnerability to its Known Exploited Vulnerabilities catalog, with a due…

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
13
Aug
2025

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Microsoft released critical security updates, addressing three serious vulnerabilities in Microsoft Office that could allow attackers to execute remote code…

New 'Curly COMrades' APT Hackers Attacking Targeting Critical Organizations in Countries
13
Aug
2025

New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries

A sophisticated new threat actor group dubbed “Curly COMrades” has emerged as a significant cybersecurity concern, conducting targeted espionage campaigns…

Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
13
Aug
2025

Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

A critical security vulnerability discovered in popular Android rooting frameworks could allow malicious applications to completely compromise rooted devices, giving…

New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems
13
Aug
2025

New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems

If you think phishing is just clicking a bad link and landing on a fake login page, Tycoon2FA will prove…

FortiOS, FortiProxy, and FortiPAM Auth Bypass Vulnerability Allows Attackers to Gain Full Control
13
Aug
2025

FortiOS, FortiProxy, and FortiPAM Auth Bypass Vulnerability Allows Attackers to Gain Full Control

A high-severity authentication bypass vulnerability affecting multiple Fortinet security products, including FortiOS, FortiProxy, and FortiPAM systems.  The flaw, designated as…