Category: CyberSecurityNews

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
15
Jul
2025

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack

A newly disclosed flaw in Apache Tomcat’s Coyote engine—tracked as CVE-2025-53506—has surfaced in the latest round of HTTP/2 security advisories….

Authorities Arrested 14 Hackers in Connection With Large-Scale Tax Fraud Operation
15
Jul
2025

Authorities Arrested 14 Hackers in Connection With Large-Scale Tax Fraud Operation

Fourteen individuals have been arrested in a coordinated international operation targeting a sophisticated cybercriminal network responsible for large-scale tax fraud…

AsyncRAT New Forks Uncovered With New Features Ranging From Screamer to a USB Malware Spreader
15
Jul
2025

AsyncRAT New Forks Uncovered With New Features Ranging From Screamer to a USB Malware Spreader

A comprehensive analysis of AsyncRAT’s expanding ecosystem, revealing a labyrinthine network of malware variants that have evolved far beyond the…

Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack
15
Jul
2025

Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack

The cybersecurity landscape has witnessed a paradigm shift in 2025, with Distributed Denial of Service (DDoS) attacks reaching unprecedented levels…

How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment 
15
Jul
2025

How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment 

Security Operations Centers (SOCs) face a fundamental challenge: distinguishing genuine threats from false positives while maintaining rapid response times. The…

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
15
Jul
2025

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Cybersecurity researchers have identified a sophisticated international fraud campaign that leverages impersonated news websites from major outlets including CNN, BBC,…

Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
15
Jul
2025

Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps

Sophisticated Android malware variant exploits ZIP-level manipulation and dynamic code loading to evade detection while conducting ad fraud operations targeting…

GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality
15
Jul
2025

GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality

A sophisticated new ransomware-as-a-service operation has emerged with advanced AI-powered negotiation capabilities and mobile management features, targeting organizations across healthcare,…

GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows
15
Jul
2025

GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows

GitGuardian, the leader in automated secrets detection and remediation, today announced the launch of its Model Context Protocol (MCP) Server, a…

Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials
15
Jul
2025

Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials

A new wave of phishing emails promising a “Social Media Manager” position at Red Bull has surfaced in corporate and…

20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes
15
Jul
2025

20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes

CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to…

Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
14
Jul
2025

Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools

Microsoft has provided comprehensive guidance for resolving the common Windows error “The process cannot access the file because it is…