Category: CyberSecurityNews

Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
14
Jul
2025

Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment

Critical security vulnerabilities have been discovered in Gigabyte UEFI firmware that could allow attackers to execute arbitrary code in System…

Wing FTP Server Vulnerability Actively Exploited
14
Jul
2025

Wing FTP Server Vulnerability Actively Exploited

Security researchers have confirmed active exploitation of a critical vulnerability in Wing FTP Server, just one day after technical details…

Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
14
Jul
2025

Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

A sophisticated malware campaign targeting Generation Z gamers has emerged, leveraging weaponized versions of popular games to infiltrate gaming communities…

Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App
14
Jul
2025

Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App

A former U.S. Air Force employee has pleaded guilty to charges of sharing classified military information about Russia’s war in…

KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique
14
Jul
2025

KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique

A sophisticated malware campaign leveraging the KongTuke threat cluster has emerged, targeting Windows users through a novel FileFix technique that…

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP
14
Jul
2025

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP

Cybersecurity researchers have developed innovative forensic methods to track sophisticated attackers who exploit Remote Desktop Protocol (RDP) for lateral movement…

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
14
Jul
2025

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction

A sophisticated zero-click attack methodology called RenderShock that exploits passive file preview and indexing behaviors in modern operating systems to…

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack
14
Jul
2025

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

A Pune-based automobile parts manufacturer fell victim to a sophisticated man-in-the-middle (MITM) cyber attack, resulting in a loss of ₹2.35…

Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
14
Jul
2025

Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure

Threat actors have escalated their campaigns from crude ransomware splashes to precision-engineered strikes that can cripple an organisation’s very lifeblood—its…

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
14
Jul
2025

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload

A malicious Microsoft Compiled HTML Help (CHM) file uploaded from Poland on 30 June 2025 has shown how a legacy…

Louis Vuitton Hacked - Attackers Stolen Customers Personal Data
14
Jul
2025

Louis Vuitton Hacked – Attackers Stolen Customers Personal Data

Key Takeaways 1. Louis Vuitton confirmed a July 2 data breach affecting UK customers, the third LVMH attack in three…

Cybersecurity Isn’t Just For Experts Anymore: Why You Should Care
14
Jul
2025

Cybersecurity Isn’t Just For Experts Anymore: Why You Should Care

Let’s face it cybersecurity used to sound like a topic only for programmers in hoodies or government agencies trying to…