Category: CyberSecurityNews

Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
29
Aug
2025

Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems

Attackers have begun leveraging a seemingly innocuous PDF newsletter alongside a malicious Windows shortcut (LNK) file to infiltrate enterprise environments….

AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System
29
Aug
2025

AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System

A sophisticated malware campaign has emerged targeting users seeking free PDF editing software, with cybercriminals distributing a malicious application masquerading…

WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users
29
Aug
2025

WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users

A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific users,…

Citrix Netscaler 0-day RCE Vulnerability Patched
29
Aug
2025

Citrix Netscaler 0-day RCE Vulnerability Patched

A significant global effort to patch a critical zero-day remote code execution (RCE) vulnerability in Citrix NetScaler devices has seen…

NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
29
Aug
2025

NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads

NodeBB, a popular open-source forum platform, has been found vulnerable to a critical SQL injection flaw in version 4.3.0.  The…

NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems
29
Aug
2025

NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems

Since its emergence in February 2025, the NightSpire ransomware group has rapidly distinguished itself through a sophisticated double-extortion strategy that…

New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data
29
Aug
2025

New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data

In June 2025, a previously undocumented campaign leveraging end-of-support software began surfacing in telemetry data gathered across Eastern Asia. Dubbed…

Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware
29
Aug
2025

Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware

A sophisticated ransomware attack has emerged targeting organizations through compromised third-party managed service provider (MSP) credentials, showcasing the evolving tactics…

Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens
29
Aug
2025

Google Confirms Potential Compromise of All Salesloft Drift Customer Authentication Tokens

Google has confirmed that a security breach involving the Salesloft Drift platform is more extensive than initially reported, potentially compromising…

DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs
29
Aug
2025

DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs

Over the past year, security researchers have observed a growing trend of North Korean–linked developers establishing credible-looking profiles on popular…

Threat Actors Weaponizing Facebook Ads with Free TradingView Premium App Lures That Delivers Android Malware
29
Aug
2025

Threat Actors Weaponizing Facebook Ads with Free TradingView Premium App Lures That Delivers Android Malware

Cybersecurity researchers have uncovered a sophisticated malvertising campaign on Meta’s Facebook platform in recent weeks that targets Android users with…

New Research With PoC Explains Security Nightmares On Coding Using LLMs
29
Aug
2025

New Research With PoC Explains Security Nightmares On Coding Using LLMs

Security researchers have uncovered significant vulnerabilities in code generated by Large Language Models (LLMs), demonstrating how “vibe coding” with AI…