Category: CyberSecurityNews

Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
07
Aug
2025

Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses

Cybersecurity researchers have uncovered a sophisticated spear phishing campaign that weaponizes Microsoft 365’s Direct Send feature to bypass traditional email…

ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
07
Aug
2025

ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub

The North Korean state-sponsored Advanced Persistent Threat (APT) group ScarCruft has launched a sophisticated new malware campaign targeting South Korean…

CISA Warns of 'ToolShell' Exploits Chain Attacks SharePoint Servers
07
Aug
2025

CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an urgent analysis in early July 2025, detailing a sophisticated exploit…

New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control
07
Aug
2025

New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control

A sophisticated new attack technique called “Ghost Calls” exploits web conferencing platforms to establish covert command and control (C2) channels. …

Google News
07
Aug
2025

IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations

During the 12-day conflict between Israel and Iran in June 2025, a sophisticated network of Iranian-linked cyber threat actors launched…

Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses
07
Aug
2025

Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses

In a sophisticated campaign first observed in October 2024, attackers have begun leveraging a legitimate driver to disable antivirus software…

New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data
07
Aug
2025

New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data

Sophisticated attack vectors unveiled that exploit hybrid Active Directory and Microsoft Entra ID environments, demonstrating how attackers can achieve complete…

HeartCrypt-Packed EDR Killer Tools ‘AVKiller’ Actively Used in Ransomware Attacks
07
Aug
2025

HeartCrypt-Packed EDR Killer Tools ‘AVKiller’ Actively Used in Ransomware Attacks

Cybersecurity teams have confronted a rising threat from a novel “EDR killer” payload in recent months, commonly referred to as…

Nvidia Says No Backdoors, No Kill Switches, and No Spyware in its Chips
07
Aug
2025

Nvidia Says No Backdoors, No Kill Switches, and No Spyware in its Chips

Nvidia Corporation has issued a strong statement asserting that its graphics processing units (GPUs) contain no backdoors, kill switches, or…

HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code
07
Aug
2025

HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code

Security researchers uncovered a series of critical zero-day vulnerabilities in HashiCorp Vault in early August 2025, the widely adopted secrets…

1.2 Million Healthcare Devices and Systems Found Exposed Online
07
Aug
2025

1.2 Million Healthcare Devices and Systems Found Exposed Online

Over 1.2 million internet-connected healthcare devices and systems with exposure that endanger patient data shown in new research by European cybersecurity…

07
Aug
2025

Gemini Exploited via Prompt Injection in Google Calendar Invite to Steal Emails, and Control Smart Devices

A sophisticated attack method exploits Google’s Gemini AI assistant through seemingly innocent calendar invitations and emails.  The attack, dubbed “Targeted…