Category: CyberSecurityNews

UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled
12
Aug
2025

UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled

UAC‑0099, a sophisticated threat actor group that has been active since at least 2022, continues to pose a significant cybersecurity…

Meta’s New Feature Transforms Instagram to a New Real-Time Location Broadcaster
12
Aug
2025

Meta’s New Feature Transforms Instagram to a New Real-Time Location Broadcaster

Meta has introduced a groundbreaking feature that fundamentally transforms Instagram from a traditional photo-sharing platform into a comprehensive real-time location…

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook
12
Aug
2025

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook

A sophisticated Visual Basic Script (VBS) malware dubbed “Silent Watcher” has emerged as a persistent threat targeting Windows systems, demonstrating…

CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack
11
Aug
2025

CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack

CastleLoader, a sophisticated malware loader that emerged in early 2025, has successfully compromised 469 devices out of 1,634 infection attempts…

SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidents
11
Aug
2025

SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents

In early August 2025, cybersecurity teams in Türkiye observed a new, highly evasive Java‐based loader that slipped past every public…

AI Coding Assistant Creating a Perfect Blueprints for Attackers
11
Aug
2025

AI Coding Assistant Creating a Perfect Blueprints for Attackers

The cybersecurity landscape faces an unprecedented threat as artificial intelligence coding assistants inadvertently transform into reconnaissance tools for malicious actors….

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware
11
Aug
2025

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

In recent weeks, a flurry of sponsored listings promising preorders for Tesla’s anticipated Optimus robots began appearing at the top…

Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks
11
Aug
2025

Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks

A critical vulnerability was uncovered that transforms ordinary Linux-powered webcams into weaponized BadUSB attack tools, enabling remote hackers to inject…

ClickFix Malware Attacks macOS Users to Steal Login Credentials
11
Aug
2025

ClickFix Malware Attacks macOS Users to Steal Login Credentials

In recent months, security researchers have observed a novel phishing campaign targeting macOS users under the guise of a CAPTCHA…

What is ClickFix Attack - How Hackers are Using it to Attack User Device With Malware
11
Aug
2025

What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware

ClickFix has emerged as one of the most dangerous and rapidly growing cybersecurity threats of 2025, representing a sophisticated evolution…

Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope
11
Aug
2025

Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope

Critical cybersecurity vulnerabilities have been identified in enterprise-level Zero Trust Network Access solutions, potentially enabling malicious actors to breach corporate networks with…

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
11
Aug
2025

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs

New Heimdal study reveals how tool sprawl creates blind spots, with over half of providers experiencing daily or weekly burnout….