Category: CyberSecurityNews

Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome
06
Aug
2025

Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome

A sophisticated new cyber campaign has emerged targeting Windows users through a deceptive malware variant known as ToneShell, which masquerades…

Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k
06
Aug
2025

Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k

In a sophisticated campaign uncovered in early 2024, cybercriminals have begun distributing malicious Ethereum smart contracts masquerading as lucrative trading…

UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware
06
Aug
2025

UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware

The Ukrainian threat intelligence group UAC-0099 has significantly evolved its cyber warfare capabilities, deploying a sophisticated new malware toolkit targeting…

Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites
06
Aug
2025

Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites

Cybercriminals have escalated their phishing operations by incorporating generative artificial intelligence tools to create sophisticated replicas of government websites, marking…

Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely
06
Aug
2025

Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely

Rockwell Automation has disclosed three critical memory corruption vulnerabilities in its Arena® Simulation software that could allow threat actors to…

WhatsApp's New Security Feature Allows Users to Pause, Question, and Verify Malicious Messages
06
Aug
2025

WhatsApp’s New Security Feature Allows Users to Pause, Question, and Verify Malicious Messages

WhatsApp has unveiled a comprehensive security enhancement that implements a “pause, question, and verify” protocol to protect users from sophisticated…

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
06
Aug
2025

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks

A sophisticated evasion technique employed by Akira ransomware affiliates, exploiting legitimate Windows drivers to bypass antivirus and endpoint detection and…

Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders
06
Aug
2025

Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders

A sophisticated Chinese threat actor has been exploiting critical vulnerabilities in Microsoft SharePoint to deploy an advanced malware toolset dubbed…

Microsoft's New AI Agent Project to Detect Malware with Reverse Engineering Tools
06
Aug
2025

Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools

Microsoft has unveiled Project Ire, an autonomous AI agent capable of reverse engineering and classifying malware at an unprecedented scale. …

Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data
06
Aug
2025

Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data

Cybercriminals are increasingly exploiting Remote Monitoring and Management (RMM) software to gain unauthorized access to corporate systems, with a sophisticated…

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild
06
Aug
2025

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Critical command injection remote code execution (RCE) vulnerabilities in Trend Micro Apex One Management Console are currently being actively exploited…

CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS
06
Aug
2025

CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS

CISA released two urgent Industrial Control Systems (ICS) advisories on August 5, 2025, addressing significant security vulnerabilities in critical manufacturing…