Category: CyberSecurityNews

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
27
Aug
2025

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript

A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi).  Tracked as CVE-2025-50975, the vulnerability allows…

CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
27
Aug
2025

CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits

CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical vulnerabilities affecting widely-deployed…

New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
27
Aug
2025

New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks

BruteForceAI, an innovative penetration testing framework developed by Mor David, integrates large language models (LLMs) with browser automation to autonomously…

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
27
Aug
2025

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression

A newly observed variant of the Zip Slip vulnerability has emerged, enabling threat actors to exploit path traversal flaws in…

Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated?
27
Aug
2025

Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated?

Spotify today rolled out a native direct messaging feature, Messages, for both Free and Premium users aged 16+ in select…

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
27
Aug
2025

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell

In recent weeks, a sophisticated phishing operation known as the ZipLine campaign has targeted U.S.-based manufacturing firms, leveraging supply-chain criticality…

DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
27
Aug
2025

DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment

A whistleblower disclosure filed today alleges that the Department of Government Efficiency (DOGE) within the Social Security Administration (SSA) covertly…

New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access
27
Aug
2025

New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access

A newly identified ransomware strain named Cephalus has emerged as a sophisticated threat, targeting organizations through compromised Remote Desktop Protocol…

Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
27
Aug
2025

Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Google has released an emergency security update for Chrome to address a critical use-after-free vulnerability (CVE-2025-9478) in the ANGLE graphics…

Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
27
Aug
2025

Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances

A sophisticated data exfiltration campaign targeting corporate Salesforce instances has exposed sensitive information from multiple organizations through compromised OAuth tokens…

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
27
Aug
2025

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

A sophisticated new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that position it among the…

China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
27
Aug
2025

China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled

China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current…