Category: CyberSecurityNews

CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits
21
Aug
2025

CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits

CISA issued four comprehensive Industrial Control Systems (ICS) advisories on August 19, 2025, highlighting serious vulnerabilities affecting critical infrastructure sectors…

New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain
21
Aug
2025

New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain

A sophisticated attack chain that combines MITM6 with NTLM relay techniques to achieve full Active Directory domain compromise.  The attack…

Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine
21
Aug
2025

Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine

A critical security vulnerability has been discovered in Microsoft’s VS Code Remote-SSH extension that allows attackers to execute malicious code…

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems
21
Aug
2025

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems

A Russian state-sponsored cyber espionage group designated as Static Tundra has been actively exploiting a seven-year-old vulnerability in Cisco networking…

Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data
21
Aug
2025

Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data

A critical security vulnerability has been discovered in Apache Tika’s PDF parser module that could enable attackers to access sensitive…

Google Announces New Capabilities for Enabling Defenders and Securing AI Innovation
21
Aug
2025

Google Announces New Capabilities for Enabling Defenders and Securing AI Innovation

Google Cloud has unveiled a comprehensive suite of security enhancements at its Security Summit 2025, marking a significant evolution in…

New Loader Malware Dubbed 'QuirkyLoader' Delivering Infostealers and RATs
21
Aug
2025

New Loader Malware Dubbed ‘QuirkyLoader’ Delivering Infostealers and RATs

A sophisticated new malware loader called QuirkyLoader has emerged as a significant cybersecurity threat, actively distributing well-known infostealers and remote…

Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times
21
Aug
2025

Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times

Japan experienced a significant surge in ransomware attacks during the first half of 2025, with incidents increasing by approximately 1.4…

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild
21
Aug
2025

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild

Apple yesterday released emergency security updates for iOS and iPadOS to patch a critical zero-day vulnerability in its core Image…

Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
20
Aug
2025

Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines

A critical security flaw in Lenovo’s AI chatbot “Lena” has been discovered that allows attackers to execute malicious scripts on…

How Businesses Stop Complex Social Engineering Attacks Early
20
Aug
2025

How Businesses Stop Complex Social Engineering Attacks Early

Attackers have leveled up. Powered by AI and professional-grade toolkits, today’s social engineering scams are nearly impossible to tell apart…

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
20
Aug
2025

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins

A novel and highly tricky phishing campaign is actively stealing Microsoft 365 credentials by exploiting Microsoft’s own Active Directory Federation…