Category: CyberSecurityNews

Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely
01
Jul
2025

Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely

A critical remote code execution (RCE) vulnerability affecting Django web applications, demonstrating how seemingly benign CSV file upload functionality can…

CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks
01
Jul
2025

CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks

CISA has issued an urgent warning regarding a critical buffer overflow vulnerability in Citrix NetScaler ADC and Gateway products, designated…

U.S DoJ Announces Nationwide Actions to Combat North Korean Remote IT Workers
01
Jul
2025

U.S DoJ Announces Nationwide Actions to Combat North Korean Remote IT Workers

The U.S. Department of Justice announced coordinated nationwide law enforcement actions on June 30, 2025, targeting North Korean remote information…

CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure
01
Jul
2025

CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, Department of Defense Cyber Crime Center, and National Security…

Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root
01
Jul
2025

Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root

A critical security vulnerability in the widely used Linux Sudo utility has been disclosed, allowing any local unprivileged user to…

Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code
01
Jul
2025

Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Google has issued an urgent security update for Chrome browser users worldwide, addressing a critical zero-day vulnerability that is actively…

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords
30
Jun
2025

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords

Cybercriminals have launched a sophisticated campaign exploiting Facebook’s advertising platform to distribute malware and steal cryptocurrency wallet credentials, targeting users…

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows
30
Jun
2025

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

A sophisticated new phishing campaign has emerged, leveraging obsolete Windows file formats and advanced evasion techniques to distribute the notorious…

New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries
30
Jun
2025

New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries

Microsoft has released RIFT (Rust Identification and Function Tagging), a groundbreaking open-source tool designed to help cybersecurity analysts identify and…

Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely
30
Jun
2025

Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely

Multiple critical vulnerabilities in D-Link router models could allow remote attackers to execute arbitrary code and gain unauthorized access to…

2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability
30
Jun
2025

2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability

Over 2,100 vulnerable Citrix NetScaler servers remain exposed to active exploitation, despite patches being available for critical vulnerabilities that allow…

Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control
30
Jun
2025

Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control

Langflow, the popular Python framework for rapid AI prototyping, is under siege after researchers disclosed CVE-2025-3248, a flaw in the…