Category: CyberSecurityNews

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections
02
Aug
2025

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

A newly identified threat actor designated Storm-2603 has emerged as a sophisticated adversary in the ransomware landscape, leveraging advanced custom…

Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks
02
Aug
2025

Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

Cybercriminals have discovered a sophisticated new attack vector by exploiting Microsoft 365’s Direct Send feature to deliver phishing campaigns that…

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
02
Aug
2025

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access

A sophisticated Linux backdoor dubbed Plague has emerged as an unprecedented threat to enterprise security, evading detection across all major…

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware
02
Aug
2025

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware

A sophisticated malware-as-a-service operation orchestrated by Chinese-speaking threat actors has successfully compromised over 11,000 Android devices worldwide through the deployment…

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One
02
Aug
2025

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One

LockBit ransomware operators have adopted an increasingly sophisticated approach to evade detection by leveraging DLL sideloading techniques that exploit the…

SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
02
Aug
2025

SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware

A suspected zero-day vulnerability in SonicWall firewall devices that the Akira ransomware group is actively exploiting. The flaw allows attackers…

SafePay Ransomware Infected 260+ Victims Across Multiple Countries
02
Aug
2025

SafePay Ransomware Infected 260+ Victims Across Multiple Countries

A new ransomware threat has emerged as one of the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming…

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
02
Aug
2025

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers

A sophisticated cyber espionage campaign targeting software developers has infiltrated two of the world’s largest open source package repositories, with…

Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS
02
Aug
2025

Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

The ransomware landscape experienced a significant shift in the second quarter of 2025 as Qilin ransomware emerged as the dominant…

Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000
01
Aug
2025

Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000

Microsoft has significantly enhanced its .NET bounty program, announcing substantial updates that expand the program’s scope, streamline award structures, and…

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025
01
Aug
2025

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025

Trend Micro’s Zero Day Initiative (ZDI) announces an unprecedented $1,000,000 bounty for a zero-click remote code execution (RCE) exploit targeting…

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems
01
Aug
2025

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems

CISA released two high-severity Industrial Control Systems (ICS) advisories on July 31, 2025, highlighting critical vulnerabilities in widely deployed industrial…