Category: CyberSecurityNews

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
05
Aug
2025

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control

A critical vulnerability chain in NVIDIA’s Triton Inference Server that allows unauthenticated attackers to achieve complete remote code execution (RCE)…

Raspberry Robin Malware Downloader Attacking Windows Systems With New Exploit for Common Log File System Driver Vulnerability
05
Aug
2025

Raspberry Robin Malware Downloader Attacking Windows Systems With New Exploit for Common Log File System Driver Vulnerability

The cybersecurity landscape faces a persistent threat as Raspberry Robin, a sophisticated malware downloader also known as Roshtyak, continues its…

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware
04
Aug
2025

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware

A sophisticated new attack method that exploits AI models’ tendency to comply with legal-sounding text, successfully bypassing safety measures in…

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
04
Aug
2025

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware

A likely zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) VPNs and firewall appliances is being actively exploited in the…

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
04
Aug
2025

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help

Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude…

Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
04
Aug
2025

Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

The sudden emergence of the Royal ransomware in early 2023 marked a significant escalation in cyber threats targeting service providers…

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
04
Aug
2025

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents

The cybersecurity landscape has witnessed an unprecedented evolution as threat actors increasingly weaponize artificial intelligence to amplify their attack capabilities…

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
04
Aug
2025

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

A sophisticated new cybercriminal campaign has emerged, leveraging a Python-based information stealer known as PXA Stealer to orchestrate one of…

Hackers Use AI to Create Malicious NPM Package that Drains Your Crypto Wallet
04
Aug
2025

Hackers Use AI to Create Malicious NPM Package that Drains Your Crypto Wallet

Cybercriminals have escalated their attack sophistication by leveraging artificial intelligence to create a malicious NPM package that masquerades as a…

CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units
04
Aug
2025

CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units

Since mid-2022, Chinese military-industrial networks have reportedly been the target of highly sophisticated cyber intrusions attributed to US intelligence agencies….

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account
04
Aug
2025

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account

Mozilla has issued an urgent security alert to its developer community following the detection of a sophisticated phishing campaign specifically…

FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition
04
Aug
2025

FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition

A critical security vulnerability affecting multiple FUJIFILM printer models could allow attackers to trigger denial-of-service (DoS) conditions through malicious network…