Category: CyberSecurityNews

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
05
Jul
2025

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

Russian Federal Security Service (FSB) officers have detained two hackers in Siberia who conducted cyberattacks on critical infrastructure facilities under…

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
05
Jul
2025

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone

Cybercriminals are exploiting the economic uncertainty and remote work trends to orchestrate sophisticated employment fraud schemes, with victims losing over…

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses
05
Jul
2025

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses

XWorm has emerged as one of the most versatile and actively distributed remote access trojans in the current threat landscape,…

Threat Actors Abused AV - EDR Evasion Framework In-The-Wild to Deploy Malware Payloads
05
Jul
2025

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Cybersecurity researchers have uncovered a concerning development as malicious actors began exploiting SHELLTER, a commercial anti-virus and endpoint detection response…

Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence
05
Jul
2025

Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence

The cybercriminal group known as Scattered Spider has significantly evolved its attack methodologies, demonstrating alarming sophistication in exploiting legitimate administrative…

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
05
Jul
2025

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle

Cybercriminals have increasingly turned to legitimate software installation frameworks as vehicles for malware distribution, with Inno Setup emerging as a…

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence
05
Jul
2025

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Cybersecurity researchers have discovered a sophisticated attack technique that exploits Microsoft Azure Arc deployments to gain persistent access to enterprise…

Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload
05
Jul
2025

Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload

A new wave of cyberattacks is targeting organizations that inadvertently expose Java Debug Wire Protocol (JDWP) servers to the internet,…

Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition
05
Jul
2025

Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition

Key Takeaways1. Next.js versions 15.1.0-15.1.8 have a cache poisoning bug causing DoS attacks through blank page delivery.2. Needs affected Next.js…

Microsoft Investigating Forms Service Issue Not Accessible for Users
04
Jul
2025

Microsoft Investigating Forms Service Issue Not Accessible for Users

Microsoft is currently investigating a significant service disruption affecting Microsoft Forms, leaving numerous users unable to access the popular online…

Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users
04
Jul
2025

Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

A sophisticated mobile ad fraud operation dubbed “IconAds” has infiltrated Android devices worldwide through 352 malicious applications distributed via Google…

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
04
Jul
2025

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Critical security vulnerabilities have been discovered in PHP that could allow attackers to execute SQL injection attacks and cause denial…