Category: CyberSecurityNews

Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information
29
Jul
2025

Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information

The commodity infostealer landscape has a new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API…

CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks
29
Jul
2025

CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding a critical vulnerability in PaperCut NG/MF print management software that threat actors are…

CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks
29
Jul
2025

CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding two critical injection vulnerabilities in Cisco’s Identity Services Engine (ISE) that threat actors…

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
29
Jul
2025

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control

Cybersecurity researchers have uncovered a sophisticated web shell attack targeting Microsoft Internet Information Services (IIS) servers, allowing threat actors to…

macOS 'Sploitlight' Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC
29
Jul
2025

macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC

A critical macOS vulnerability enables attackers to bypass Transparency, Consent, and Control (TCC) protections and steal sensitive user data, including…

GitHub Outage Disrupts Core Services Globally for Users
29
Jul
2025

GitHub Outage Disrupts Core Services Globally for Users

GitHub experienced a widespread outage on July 28, 2025, affecting millions of developers and organizations reliant on its services. The…

Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered
29
Jul
2025

Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered

A sophisticated Russian state-sponsored advanced persistent threat (APT) group known as Laundry Bear has emerged as a significant cybersecurity concern,…

Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now
29
Jul
2025

Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now

The cybercriminal landscape has witnessed a dramatic shift with the emergence of sophisticated malware-as-a-service (MaaS) platforms targeting Android devices. Criminal…

Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access
28
Jul
2025

Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access

The Atomic macOS Stealer (AMOS) has undergone a significant evolution, transforming from a traditional information stealer into a sophisticated persistent…

Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration
28
Jul
2025

Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration

The cyberthreat landscape witnessed a concerning evolution in 2025 as the notorious Muddled Libra threat group dramatically shifted their attack…

New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials
28
Jul
2025

New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials

A sophisticated new information stealer named SHUYAL has emerged in the cybersecurity landscape, demonstrating unprecedented scope in its credential harvesting…

Women’s Dating App Tea Exposes Selfie Images of 13,000 Users
28
Jul
2025

Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

The women-only dating safety app Tea has suffered a significant cybersecurity incident, with hackers gaining unauthorized access to approximately 72,000…