Category: CyberSecurityNews

How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks
05
Aug
2025

How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks

SSL certificates are used everywhere from websites and APIs to mobile apps, internal tools and CI/CD pipelines. While most teams…

New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
05
Aug
2025

New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands

A critical vulnerability in Cursor IDE, the rapidly growing AI-powered development environment, enables persistent remote code execution through manipulation of…

How To Get Real-Time IOCs From Incidents Across 15K SOCs 
05
Aug
2025

How To Get Real-Time IOCs From Incidents Across 15K SOCs 

Cybersecurity is about staying one step ahead. The security of business assets hinges on proactive threat detection and rapid response…

SonicWall Warns of Escalating Cyberattacks Targeting Gen 7 Firewalls in Last 72 Hours
05
Aug
2025

SonicWall Warns of Escalating Cyberattacks Targeting Gen 7 Firewalls in Last 72 Hours

SonicWall has issued an urgent security advisory following a significant increase in cyber incidents targeting its Gen 7 SonicWall firewalls…

New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks
05
Aug
2025

New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks

A critical vulnerability in Streamlit, the popular open-source framework for building data applications, enables attackers to conduct cloud account takeover…

Cloudflare Accuses Perplexity AI For Evading Firewalls and Crawling Websites by Changing User Agent
05
Aug
2025

Cloudflare Accuses Perplexity AI For Evading Firewalls and Crawling Websites by Changing User Agent

Perplexity AI, an emerging question-answering engine powered by advanced large language models, has recently come under scrutiny for deploying stealth…

APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials
05
Aug
2025

APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials

A sophisticated phishing campaign attributed to the Pakistan-linked APT36 group has emerged as a serious threat to Indian government infrastructure….

Cisco Hacked - Attackers Stolen Profile Details of users Registered on Cisco.com
05
Aug
2025

Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com

Cisco has confirmed it was the target of a cyberattack where a malicious actor successfully stole the basic profile information…

North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data
05
Aug
2025

North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data

A sophisticated North Korean cryptocurrency theft campaign has resurfaced with renewed vigor, weaponizing twelve malicious NPM packages to target developers…

Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender
05
Aug
2025

Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender

North Korean state-sponsored cyber-espionage group Kimsuky has unveiled a sophisticated new campaign targeting South Korean entities through malicious Windows shortcut…

Hackers Can Steal IIS Machine Keys by Exploit SharePoint Deserialization Vulnerability
05
Aug
2025

Hackers Can Steal IIS Machine Keys by Exploit SharePoint Deserialization Vulnerability

A sophisticated attack method where hackers are exploiting a deserialization vulnerability in SharePoint to steal Internet Information Services (IIS) Machine…

Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code
05
Aug
2025

Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code

The open-source software ecosystem, once considered a bastion of collaborative development, has become an increasingly attractive target for cybercriminals seeking…