Category: CyberSecurityNews

Cyber Attacks Against AI Infrastructure Are in The Rise With Key Vulnerabilities Uncovered
06
Aug
2025

Cyber Attacks Against AI Infrastructure Are in The Rise With Key Vulnerabilities Uncovered

Cyber-criminals have gradually shifted their focus toward the high-value infrastructure that trains, tunes and serves modern artificial-intelligence models. Over the…

Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for 'ManageEngine OpManager'
06
Aug
2025

Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’

Cybersecurity researchers have uncovered a sophisticated search engine optimization (SEO) poisoning campaign that exploited Bing search results to distribute Bumblebee…

Microsoft Zero Day Quest Hacking Contest
06
Aug
2025

Microsoft Zero Day Quest Hacking Contest

Microsoft has announced the return of its groundbreaking Zero Day Quest, the largest public hacking event in history, offering unprecedented…

Critical Firmware Vulnerabilities Exposes Millions of Dell Laptops to Device Takeover and Malware Attacks
06
Aug
2025

Critical Firmware Vulnerabilities Exposes Millions of Dell Laptops to Device Takeover and Malware Attacks

A wide range of vulnerabilities affects millions of Dell laptops used by government agencies, cybersecurity professionals, and enterprises worldwide. The…

U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity
06
Aug
2025

U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity

The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) has issued a critical warning about the exploitation of…

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks
06
Aug
2025

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to…

10,000+ Malicious TikTok Shop Domains Attacking Users to Steal Logins and Deploy Malware
06
Aug
2025

10,000+ Malicious TikTok Shop Domains Attacking Users to Steal Logins and Deploy Malware

A sophisticated cybercriminal campaign dubbed “ClickTok” has emerged as one of the most extensive threats targeting TikTok Shop users worldwide,…

How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks
05
Aug
2025

How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks

SSL certificates are used everywhere from websites and APIs to mobile apps, internal tools and CI/CD pipelines. While most teams…

New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
05
Aug
2025

New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands

A critical vulnerability in Cursor IDE, the rapidly growing AI-powered development environment, enables persistent remote code execution through manipulation of…

How To Get Real-Time IOCs From Incidents Across 15K SOCs 
05
Aug
2025

How To Get Real-Time IOCs From Incidents Across 15K SOCs 

Cybersecurity is about staying one step ahead. The security of business assets hinges on proactive threat detection and rapid response…

SonicWall Warns of Escalating Cyberattacks Targeting Gen 7 Firewalls in Last 72 Hours
05
Aug
2025

SonicWall Warns of Escalating Cyberattacks Targeting Gen 7 Firewalls in Last 72 Hours

SonicWall has issued an urgent security advisory following a significant increase in cyber incidents targeting its Gen 7 SonicWall firewalls…

New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks
05
Aug
2025

New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks

A critical vulnerability in Streamlit, the popular open-source framework for building data applications, enables attackers to conduct cloud account takeover…