Category: CyberSecurityNews

PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input
29
Aug
2025

PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input

A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in the widely used PhpSpreadsheet library, potentially allowing attackers to…

How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?
29
Aug
2025

How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?

Adversary-in-the-Middle (AiTM) attacks are among the most sophisticated and dangerous phishing techniques in the modern cybersecurity landscape. Unlike traditional phishing…

New Mac Malware Dubbed 'JSCoreRunner' Weaponizing PDF Conversion Site to Deliver Malware
29
Aug
2025

New Mac Malware Dubbed ‘JSCoreRunner’ Weaponizing PDF Conversion Site to Deliver Malware

A sophisticated new Mac malware campaign has emerged, targeting users through a deceptive PDF conversion website that conceals a dangerous…

Nx Packages With Millions of Weekly Downloads Hacked With Credential Stealer Malware
29
Aug
2025

Nx Packages With Millions of Weekly Downloads Hacked With Credential Stealer Malware

A sophisticated supply chain attack has compromised the popular Nx build platform, affecting millions of weekly downloads and resulting in…

Hackers Exploit Microsoft Teams, Mimicking an IT Help Desk for Screen Sharing and Remote Access
29
Aug
2025

Hackers Exploit Microsoft Teams, Mimicking an IT Help Desk for Screen Sharing and Remote Access

A sophisticated phishing campaign has been identified, where threat actors impersonate IT helpdesk personnel through Teams’ external communication features, exploiting…

Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT
29
Aug
2025

Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT

In a sophisticated campaign uncovered during a recent Advanced Continual Threat Hunt (ACTH) by Trustwave’s SpiderLabs team, threat actors weaponized…

UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data
29
Aug
2025

UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data

The emergence of sophisticated cybercriminal organizations continues to pose significant threats to individuals and institutions worldwide, with the UTG-Q-1000 group…

Hackers Attempted to Misuse Claude AI to Launch Cyber Attacks
29
Aug
2025

Hackers Attempted to Misuse Claude AI to Launch Cyber Attacks

Anthropic has thwarted multiple sophisticated attempts by cybercriminals to misuse its Claude AI platform, according to a newly released Threat…

Farmers Insurance Cyber Attack - 1.1 Million Customers Data Exposed in Salesforce Attack
28
Aug
2025

Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack

Farmers Insurance Exchange and its subsidiaries recently disclosed a significant security incident that compromised personal information of approximately 1.1 million…

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
28
Aug
2025

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims

South Korean authorities have successfully extradited a Chinese national suspected of orchestrating one of the most sophisticated hacking operations targeting…

Cisco Nexus 3000 and 9000 Series Vulnerability Let Attackers Trigger DoS Attack
28
Aug
2025

Cisco Nexus 3000 and 9000 Series Vulnerability Let Attackers Trigger DoS Attack

Cisco has issued a High-severity security advisory alerting customers to a critical vulnerability in the Intermediate System-to-Intermediate System (IS-IS) feature…

Nevada IT Systems Hit by Cyberattack
28
Aug
2025

Nevada IT Systems Hit by Cyberattack

A significant cyberattack disrupted Nevada’s state government network on August 24, forcing all state office branches to shut down operations…