Category: CyberSecurityNews

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis
12
May
2025

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis

Cybersecurity experts have identified a sophisticated phishing technique that exploits blob URIs (Uniform Resource Identifiers) to evade detection by Secure…

Critical Vulnerabilities in Mitel SIP Phones Let Attackers Inject Malicious Commands
12
May
2025

Critical Vulnerabilities in Mitel SIP Phones Let Attackers Inject Malicious Commands

Security researchers have discovered two significant vulnerabilities affecting Mitel’s suite of SIP phones that could allow attackers to execute arbitrary…

Defendnot Disables Windows Defender by Posing as an Antivirus Solution
12
May
2025

Defendnot Disables Windows Defender by Posing as an Antivirus Solution

Defendnot, a sophisticated new tool that effectively disables Windows Defender by exploiting the Windows Security Center (WSC) API to register…

Microsoft Teams To Block Screen Capture During Meetings
11
May
2025

Microsoft Teams To Block Screen Capture During Meetings

Microsoft has announced a new “Prevent Screen Capture” feature for Teams that will block unauthorized screenshots during meetings. The feature,…

"PupkinStealer" A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram
10
May
2025

“PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram

A newly identified information-stealing malware, dubbed PupkinStealer, Developed in C# using the .NET framework, this lightweight yet effective malware targets…

Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers
10
May
2025

Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers

As artificial intelligence (AI) tools gain mainstream traction for content creation, cybercriminals are capitalizing on the hype with a sophisticated…

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly
10
May
2025

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly

In a coordinated effort, Lumen Technologies’ Black Lotus Labs, the U.S. Department of Justice (DOJ), the Federal Bureau of Investigation…

Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services
10
May
2025

Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services

Cybersecurity experts have identified an escalating campaign by the notorious hacker collective Scattered Spider, which continues to evolve its sophisticated…

5 Must-Have Security Features for Native Apps
10
May
2025

5 Must-Have Security Features for Native Apps

Native apps are built compatible with a platform or operating system, such as iOS or Android. While unrestricted access to…

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
10
May
2025

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads

A sophisticated supply chain attack targeting the popular npm package ‘rand-user-agent’ was discovered on May 5, 2025. The compromise affects…

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands
10
May
2025

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands

A new ransomware strain dubbed “Mamona” that operates entirely offline and leverages a clever attack strategy that abuses the Windows…

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands
10
May
2025

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands

A seemingly innocent Python package has been unmasked as a sophisticated remote access trojan (RAT) targeting the Discord developer community….