Category: CyberSecurityNews

Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability
21
Jul
2025

Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Microsoft has issued an urgent security advisory addressing critical zero-day vulnerabilities in on-premises SharePoint Server that attackers are actively exploiting. …

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator
21
Jul
2025

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator

A sophisticated new attack technique compromises Fast IDentity Online (FIDO) key authentication by exploiting cross-device sign-in features.  The PoisonSeed attack…

PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability
21
Jul
2025

PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability

A critical container escape vulnerability has emerged in the NVIDIA Container Toolkit, threatening the security foundation of AI infrastructure worldwide….

New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System
21
Jul
2025

New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System

A critical memory corruption vulnerability in the popular file archiver 7-Zip has been discovered that allows attackers to trigger denial…

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards
20
Jul
2025

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Two significant Grafana vulnerabilities that could allow attackers to redirect users to malicious websites and execute arbitrary JavaScript code.  The…

SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access
20
Jul
2025

SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access

A sophisticated cyberattack campaign targeting Microsoft SharePoint servers has been discovered exploiting a newly weaponized vulnerability chain dubbed “ToolShell,” enabling…

Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials
19
Jul
2025

Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials

A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake…

Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
19
Jul
2025

Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware

A sophisticated Chinese threat actor campaign has emerged as one of the most persistent malware distribution operations targeting Chinese-speaking communities…

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
19
Jul
2025

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users

A sophisticated phishing campaign targeting organizations has emerged, exploiting the trusted reputation of Veeam Software through weaponized WAV audio files…

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
19
Jul
2025

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

A critical zero-day flaw in the CrushFTP managed file-transfer platform was confirmed after vendor and threat-intelligence sources confirmed active exploitation…

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials
19
Jul
2025

New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

A sophisticated phishing campaign dubbed “Scanception” has emerged as a significant threat to enterprise security, leveraging QR codes embedded in…

Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs
19
Jul
2025

Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs

The cybersecurity landscape continues to face significant threats from sophisticated information stealers, with Lumma emerging as one of the most…