Category: CyberSecurityNews

APT Exploitation of Supply Chain Vulnerabilities in Enterprises
29
May
2025

APT Exploitation of Supply Chain Vulnerabilities in Enterprises

In 2025, the exploitation of supply chain vulnerabilities by Advanced Persistent Threats (APTs) has emerged as one of the most…

Advanced Detection Strategies for APT Campaigns in 2025 Networks
29
May
2025

Advanced Detection Strategies for APT Campaigns in 2025 Networks

The cybersecurity landscape of 2025 has become a high-stakes battleground as Advanced Persistent Threat (APT) campaigns leverage artificial intelligence, zero-day…

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key
29
May
2025

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

A sophisticated botnet campaign dubbed “AyySSHush” has compromised over 9,000 ASUS routers worldwide, establishing persistent backdoor access that survives firmware…

OneDrive File Picker Vulnerability Exposes Users' Entire Cloud Storage to Websites
29
May
2025

OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites

A critical security flaw in Microsoft’s OneDrive File Picker has exposed millions of users to unauthorized data access, allowing third-party…

ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger
29
May
2025

ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger

Cybersecurity researchers have uncovered a sophisticated new attack method called “ChoiceJacking” that allows malicious charging stations to steal sensitive data…

Building a Cyber-Resilient Organization in 2025
29
May
2025

Building a Cyber-Resilient Organization in 2025

As 2025 unfolds, the digital battleground has never been more complex-or more consequential. Cyberattacks are no longer isolated incidents but…

Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition
29
May
2025

Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition

Zscaler Inc. announced on May 27, 2025, a definitive agreement to acquire Red Canary, a leading Managed Detection and Response…

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware
28
May
2025

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware

Cybercriminals leveraged critical vulnerabilities in remote monitoring software to breach a managed service provider and attack multiple customers. Cybersecurity researchers…

Wordpress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack
28
May
2025

WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

A critical security vulnerability in the popular TI WooCommerce Wishlist plugin has left over 100,000 WordPress websites exposed to potential…

93+ Billion Stolen Users' Cookies Flooded by Hackers on the Dark Web
28
May
2025

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Security researchers have uncovered a significant cybercrime operation involving 93.7 billion stolen browser cookies circulating on dark web marketplaces, representing…

Incident Response Planning - Preparing for Data Breaches
28
May
2025

Incident Response Planning – Preparing for Data Breaches

As the digital threat landscape intensifies and new technologies reshape business operations, cybersecurity budgeting in 2025 will be significantly transformed….

3 SOC Metrics Improved With Sandbox Analysis 
28
May
2025

3 SOC Metrics Improved With Sandbox Analysis 

SOC teams are flooded with alerts, but what really matters is how quickly they can detect, investigate, and respond. When…