Category: CyberSecurityNews

Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity
22
Aug
2025

Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity

The Lumma information stealer has evolved from its 2022 origins into one of the most sophisticated malware-as-a-service (MaaS) ecosystems in…

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram
22
Aug
2025

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram

A sophisticated supply chain attack has emerged targeting developers through a malicious Go module package that masquerades as a legitimate…

Windows Docker Desktop Vulnerability Leads to Full Host Compromise
22
Aug
2025

Windows Docker Desktop Vulnerability Leads to Full Host Compromise

A newly disclosed vulnerability in Docker Desktop for Windows has revealed how a simple Server-Side Request Forgery (SSRF) attack could…

Anatsa Malware Attacking Android Devices to Steal Login Credentials and Monitor Keystrokes
22
Aug
2025

Anatsa Malware Attacking Android Devices to Steal Login Credentials and Monitor Keystrokes

The Anatsa banking trojan, also known as TeaBot, continues to evolve as one of the most sophisticated Android malware threats…

Azure's Default API Connection Vulnerability Enables Full Cross-Tenant Compromise
22
Aug
2025

Azure’s Default API Connection Vulnerability Enables Full Cross-Tenant Compromise

A critical vulnerability in Microsoft Azure’s API Connection infrastructure enabled attackers to compromise resources across different Azure tenants worldwide.  The…

NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems
22
Aug
2025

NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems

The National Institute of Standards and Technology (NIST) has unveiled a comprehensive concept paper outlining proposed NIST SP 800-53 Control…

Colt Confirms Customer Data Stolen in Ransomware Attack
22
Aug
2025

Colt Confirms Customer Data Stolen in Ransomware Attack

Telecommunications giant Colt Technology Services has confirmed that customer data was compromised in a sophisticated cyber attack that began on…

Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices
22
Aug
2025

Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices

Cybersecurity researchers have identified a sophisticated social engineering technique called ClickFix that has been rapidly gaining traction among threat actors…

New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor
22
Aug
2025

New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor

Linux environments, long considered bastions of security, are facing a sophisticated new threat that challenges traditional assumptions about operating system…

AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
22
Aug
2025

AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes

Artificial intelligence systems can automatically generate functional exploits for newly published Common Vulnerabilities and Exposures (CVEs) in just 10-15 minutes…

ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words
22
Aug
2025

ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words

A critical vulnerability in OpenAI’s latest flagship model, ChatGPT-5, allows attackers to sidestep its advanced safety features using simple phrases….

Kali Vagrant Rebuilt Released - Pre-configured DebOS VMs via Command Line
21
Aug
2025

Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line

The Kali Linux team has announced a significant enhancement of its Vagrant image build process, streamlining development and simplifying deployment…