Category: CyberSecurityNews

Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day
04
Aug
2025

Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day

Researchers exploited CVE-2025-38001—a previously unknown Use-After-Free (UAF) vulnerability in the Linux HFSC queuing discipline—to compromise all Google kernelCTF instances (LTS,…

New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines
04
Aug
2025

New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines

In recent weeks, cybersecurity teams have observed a surge in malicious campaigns exploiting Windows shortcut (LNK) files to deliver sophisticated…

Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities
04
Aug
2025

Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities

Cybersecurity researchers have uncovered a groundbreaking pattern that could revolutionize how organizations prepare for emerging threats. A comprehensive analysis reveals…

LARGEST EVER Bitcoin Hack Valued $3.5 Billion Uncovered
04
Aug
2025

LARGEST EVER Bitcoin Hack Valued $3.5 Billion Uncovered

The largest cryptocurrency hack ever recorded involved the theft of 127,426 BTC from Chinese mining pool LuBian in December 2020. …

Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User
04
Aug
2025

Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User

A novel lateral movement technique that exploits BitLocker’s Component Object Model (COM) functionality to execute malicious code on target systems….

Critical HashiCorp Vulnerability Execute Arbitrary Code on Underlying Host
04
Aug
2025

Critical HashiCorp Vulnerability Execute Arbitrary Code on Underlying Host

A critical HashiCorp security vulnerability affecting Vault Community Edition and Enterprise versions could allow privileged operators to execute arbitrary code…

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
04
Aug
2025

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

A severe vulnerability in the popular AI-powered code editor Cursor IDE, dubbed “CurXecute,” allows attackers to execute arbitrary code on…

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging "mspaint.exe" File
04
Aug
2025

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File

A sophisticated new wave of cyberattacks attributed to North Korea’s notorious APT37 (Reaper) group is leveraging advanced malware hidden within…

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
04
Aug
2025

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online

A significant security breach has compromised Microsoft’s PlayReady Digital Rights Management (DRM) system, exposing critical certificates that protect premium streaming…

Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines
04
Aug
2025

Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines

The cybersecurity landscape continues to evolve as threat actors develop increasingly sophisticated methods to compromise Windows systems. A new ransomware…

Cybersecurity News Recap - Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack
03
Aug
2025

Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack

Welcome to this week’s edition of Cybersecurity News Recap! In this issue, we bring you the latest updates and critical developments…

Secret Blizzard Group’s ApolloShadow Malware Install Root Certificates on Devices to Trust Malicious Sites
02
Aug
2025

Secret Blizzard Group’s ApolloShadow Malware Install Root Certificates on Devices to Trust Malicious Sites

A sophisticated cyberespionage campaign targeting foreign embassies in Moscow has been uncovered, revealing the deployment of a custom malware strain…