Category: CyberSecurityNews

Beware of Fake Booking.com Sites That Infects Your Devices With AsyncRAT
03
Jun
2025

Beware of Fake Booking.com Sites That Infects Your Devices With AsyncRAT

Cybercriminals have launched a sophisticated campaign targeting travelers through fake Booking.com websites that deploy AsyncRAT malware, according to recent security…

Malicious NPM Packages Attacking Ethereum Wallets Using Obfuscated JavaScript
03
Jun
2025

Malicious NPM Packages Attacking Ethereum Wallets Using Obfuscated JavaScript

A sophisticated cryptocurrency theft campaign has emerged on the npm package registry, targeting developers and cryptocurrency users through malicious packages…

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation
03
Jun
2025

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation

A significant vulnerability, CVE-2025-26396, affects the SolarWinds Dameware Mini Remote Control Service could allow attackers to escalate privileges on affected…

New ModSecurity WAF Vulnerability Let Attackers Crash the System
03
Jun
2025

New ModSecurity WAF Vulnerability Let Attackers Crash the System

A significant denial of service vulnerability has been discovered in ModSecurity, one of the most widely deployed open-source web application…

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely
03
Jun
2025

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Multiple security vulnerabilities in Hewlett-Packard Enterprise (HPE) StoreOnce software platform that could allow remote attackers to execute malicious code, bypass…

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code
03
Jun
2025

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

A significant security vulnerability in the Splunk Enterprise platform could allow low-privileged attackers to execute unauthorized JavaScript code through a…

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads
03
Jun
2025

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads

Cybercriminals are increasingly leveraging misconfigured artificial intelligence tools to execute sophisticated attacks that generate and deploy malicious payloads automatically, marking…

SentinelOneOutage Root Cause
03
Jun
2025

SentinelOne Global Service Outage Root Cause Revealed

Cybersecurity company SentinelOne has released a comprehensive root cause analysis revealing that a software flaw in an infrastructure control system…

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code
03
Jun
2025

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Google has released an emergency security update for Chrome after confirming that a critical zero-day vulnerability is being actively exploited…

Haozi's Plug-and-Play Phishing Attack Stolen Over $280,000 From Users
03
Jun
2025

Haozi’s Plug-and-Play Phishing Attack Stolen Over $280,000 From Users

A sophisticated phishing-as-a-service operation known as Haozi has emerged as a significant threat in the cybercriminal landscape, facilitating over $280,000…

A FakeCaptcha Kit That Trick Users to Run Code via The Windows Run Command
03
Jun
2025

A FakeCaptcha Kit That Trick Users to Run Code via The Windows Run Command

A new and sophisticated malware distribution framework dubbed “HuluCaptcha” has emerged, leveraging fake CAPTCHA verification pages to trick users into…

Threat Actors Using ClickFix Technique to Deliver EddieStealer Malware
03
Jun
2025

Threat Actors Using ClickFix Technique to Deliver EddieStealer Malware

Cybersecurity researchers have identified a sophisticated new malware campaign leveraging the deceptive ClickFix technique to distribute EddieStealer, a dangerous information-stealing…