Category: CyberSecurityNews

Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials
08
Aug
2025

Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials

A sophisticated technique dubbed “ECScape” that allows malicious containers running on Amazon Elastic Container Service (ECS) to steal AWS credentials…

Threat Actors Weaponize Malicious Gopackages to Deliver Obfuscated Remote Payloads
08
Aug
2025

Threat Actors Weaponize Malicious Gopackages to Deliver Obfuscated Remote Payloads

Cybersecurity researchers have uncovered a sophisticated malware campaign targeting the Go ecosystem through eleven malicious packages that employ advanced obfuscation…

Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims
08
Aug
2025

Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims

A sophisticated cybercriminal operation known as GreedyBear has orchestrated one of the most extensive cryptocurrency theft campaigns to date, deploying…

Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands
08
Aug
2025

Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands

A new and custom firmware for the popular Flipper Zero multi-tool device is reportedly capable of bypassing the rolling code…

CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday
08
Aug
2025

CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday

CISA has issued an emergency advisory directing all Federal Civilian Executive Branch agencies to mitigate a newly disclosed Microsoft Exchange…

08
Aug
2025

Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands

A new and custom firmware for the popular Flipper Zero multi-tool device is reportedly capable of bypassing the rolling code…

Guided Selling in 3D Product Configurators
08
Aug
2025

Guided Selling in 3D Product Configurators

People don’t want to guess when they buy something – especially something complex or customizable. They want to feel like…

Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks
08
Aug
2025

Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks

A sophisticated cybercriminal operation that targeted American tax preparation businesses through spearphishing campaigns has culminated in the extradition of Nigerian…

Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
08
Aug
2025

Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems

Cybercriminals have begun exploiting Scalable Vector Graphics (SVG) files as sophisticated attack vectors, transforming seemingly harmless image files into potent…

WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch
07
Aug
2025

WhatsApp Developers Under Attack From Weaponized npm Packages with Remote Kill Switch

Two malicious npm packages have emerged as sophisticated weapons targeting WhatsApp developers through a remote-controlled destruction mechanism that can completely…

SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability
07
Aug
2025

SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability

Cybersecurity firm SonicWall has officially addressed recent concerns about a potential new zero-day vulnerability in its Secure Sockets Layer Virtual…

WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities
07
Aug
2025

WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities

WhatsApp has successfully dismantled 6.8 million accounts linked to fraudulent activities during the first half of 2024, representing a significant…