Category: CyberSecurityNews

Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages
05
Jun
2025

Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages

A sophisticated supply chain attack has emerged targeting the RubyGems ecosystem, exploiting geopolitical tensions surrounding Vietnam’s recent Telegram ban to…

New Firefox Feature Automatically Detects Malicious Extensions by Behavior
05
Jun
2025

New Firefox Feature Automatically Detects Malicious Extensions by Behavior

A sophisticated new security feature has been released by Firefox designed to automatically identify and neutralize malicious browser extensions before…

Google to Remove Two Certificate Authorities from Chrome Root Store
05
Jun
2025

Google to Remove Two Certificate Authorities from Chrome Root Store

Google has announced plans to remove two Certificate Authorities (CAs) from Chrome’s Root Store due to ongoing security concerns.  The…

Threat Actors Exploit 'Prove You Are Human' Scheme To Deliver Malware
05
Jun
2025

Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign that weaponizes users’ trust in routine internet verification processes to deliver malicious…

Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks
05
Jun
2025

Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks

Windows authentication coercion attacks continue to pose substantial risks to enterprise Active Directory environments in 2025, despite Microsoft’s ongoing efforts…

IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files
05
Jun
2025

IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files

Multiple severe vulnerabilities in IBM QRadar Suite Software that could allow attackers to access sensitive configuration files and compromise enterprise…

Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups
04
Jun
2025

Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups

Aembit, the workload identity and access management (IAM) company, today announced its inclusion in Rising in Cyber 2025, an independent list…

How Anat Heilper Orchestrates Breakthroughs In Silicon And Software
04
Jun
2025

How Anat Heilper Orchestrates Breakthroughs In Silicon And Software

Anat Heilper is redefining what it means to be a technical leader in AI, not by following the path but…

New Crocodilus Malware That Gain Complete Control of Android Device
04
Jun
2025

New Crocodilus Malware That Gain Complete Control of Android Device

A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that…

How To Detect Them Early 
04
Jun
2025

How To Detect Them Early 

Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake…

New Research Reveals Strengths and Gaps in Cloud-Based LLM Guardrails
04
Jun
2025

New Research Reveals Strengths and Gaps in Cloud-Based LLM Guardrails

A comprehensive new study has exposed significant vulnerabilities and inconsistencies in the security mechanisms protecting major cloud-based large language model…

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware
04
Jun
2025

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware

A sophisticated cryptojacking campaign has emerged targeting widely-used DevOps applications through the exploitation of common misconfigurations rather than zero-day vulnerabilities….