Category: CyberSecurityNews

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems
26
Aug
2025

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems

In August 2025, researchers at George Mason University published a groundbreaking study at the 34th USENIX Security Symposium, introducing OneFlip,…

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers
26
Aug
2025

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers

The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR,…

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
26
Aug
2025

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild

Google has disclosed a critical zero-day vulnerability in the V8 JavaScript engine used by Chrome, tracked as CVE-2025-5419.  Before a…

French Retailer Auchan Cyberattack  - Thousands of Customers Personal Data Exposed
26
Aug
2025

French Retailer Auchan Cyberattack  – Thousands of Customers Personal Data Exposed

Major French retail chain Auchan announced on August 21, 2025, that it suffered a significant cybersecurity incident resulting in the…

X/Twitter The Most Aggressive Social Media App Collecting Users Location Information
26
Aug
2025

X/Twitter The Most Aggressive Social Media App Collecting Users Location Information

A comprehensive analysis of the top 10 social media platforms reveals that X (formerly Twitter) stands out as the most…

Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services
26
Aug
2025

Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services

A malvertising campaign using sponsored results on Microsoft’s search platform delivered a weaponized PuTTY that established persistence, enabled hands-on keyboard…

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
26
Aug
2025

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof

Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary…

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection

A stealthy espionage campaign emerged in early 2025 targeting diplomats and government entities in Southeast Asia and beyond. At the…

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s
26
Aug
2025

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s

A massive coordinated scanning campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with threat actors deploying over 30,000 unique IP…

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets
25
Aug
2025

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets

A critical security vulnerability has been discovered in Zendesk’s Android SDK implementation that allows attackers to perform mass account takeovers…

Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware
25
Aug
2025

Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware

A novel adaptation of the ClickFix social engineering technique has been identified, leveraging invisible prompt injection to weaponize AI summarization…

Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware
25
Aug
2025

Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware

A sophisticated Android malware campaign has resurfaced, exploiting deceptive websites that perfectly mimic legitimate Google Play Store application pages to…