Category: CyberSecurityNews

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea
08
Sep
2025

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea

Microsoft’s Azure cloud platform is facing significant disruptions after multiple undersea fiber optic cables were severed in the Red Sea….

Apache Jackrabbit Exposes Systems To Arbitrary Code Execution Attacks
08
Sep
2025

Apache Jackrabbit Exposes Systems To Arbitrary Code Execution Attacks

An important security vulnerability has been discovered in Apache Jackrabbit, a popular open-source content repository used in enterprise content management…

How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach
08
Sep
2025

How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach

After a security breach, forensic investigators work quickly to follow the attacker’s trail. Security experts have analyzed this situation and…

U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China
08
Sep
2025

U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China

U.S. federal authorities have launched an investigation into a sophisticated malware campaign that targeted sensitive trade negotiations between Washington and…

Australian Authorities Uncovered Activities and Careers of Ransomware Criminal Groups
08
Sep
2025

Australian Authorities Uncovered Activities and Careers of Ransomware Criminal Groups

Ransomware has emerged as one of the most devastating cybercrime threats in the contemporary digital landscape, with criminal organizations operating…

Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
08
Sep
2025

Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data

The notorious Lazarus APT group has evolved its attack methodology by incorporating the increasingly popular ClickFix social engineering technique to…

Google News
06
Sep
2025

Critical Argo CD API Vulnerability Exposes Repository Credentials

A critical vulnerability has been discovered in Argo CD that allows API tokens with limited permissions to access sensitive repository…

"GPUGate" Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
06
Sep
2025

“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

A sophisticated malware campaign, dubbed “GPUGate,” abuses Google Ads and GitHub’s repository structure to trick users into downloading malicious software….

Kali Linux vs Parrot OS
06
Sep
2025

Kali Linux vs Parrot OS

Penetration testing and ethical hacking have been dominated by specialized Linux distributions designed to provide security professionals with comprehensive toolsets…

SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
06
Sep
2025

SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month

A new ransomware threat has emerged as one of 2025’s most prolific cybercriminal operations, with SafePay ransomware claiming attacks against…

143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
06
Sep
2025

143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Cybercriminals unleashed a massive wave of mobile malware attacks during the second quarter of 2025, with security researchers detecting nearly…

New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
05
Sep
2025

New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

A recent investigation has revealed that Microsoft employed China-based engineers to maintain and support SharePoint software, the same collaboration platform…