Category: CyberSecurityNews

Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data
24
Jun
2025

Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data

A sophisticated phishing campaign emerged in May 2025, targeting U.S. citizens through a coordinated impersonation of state Department of Motor…

Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
24
Jun
2025

Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers

A sophisticated malware campaign has emerged targeting WordPress and WooCommerce websites with highly obfuscated credit card skimmers and credential theft…

Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code
24
Jun
2025

Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities in Aviatrix Controller, a Software-Defined Networking (SDN) utility that enables cloud connectivity across different vendors and regions. …

OWASP AI Testing Guide - A New Project to Detect Vulnerabilities in AI Applications
24
Jun
2025

OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications

The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a…

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File
24
Jun
2025

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File

Summary 1. A high-severity flaw (CVE-2025-6218) in WinRAR allows attackers to execute arbitrary code by exploiting how the software handles…

North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands
24
Jun
2025

North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands

A sophisticated cybercriminal campaign has emerged targeting professionals through meticulously crafted fake Zoom applications designed to execute system takeover commands….

WhatsApp Banned on U.S. House Staffers Devices Due to Potential Security Risks
24
Jun
2025

WhatsApp Banned on U.S. House Staffers Devices Due to Potential Security Risks

Summary 1. The U.S. House Chief Administrative Officer banned WhatsApp from all government-issued devices used by congressional staffers, including mobile,…

LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly
24
Jun
2025

LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly

A sophisticated China-linked cyber espionage campaign has emerged, targeting over 1,000 Small Office/Home Office (SOHO) devices worldwide through an advanced…

Notepad++ Vulnerability Let Attacker Gains Complete System Control
24
Jun
2025

Notepad++ Vulnerability Let Attacker Gains Complete System Control

A severe privilege escalation vulnerability has been discovered in Notepad++ version 8.8.1, potentially exposing millions of users worldwide to complete…

24
Jun
2025

Notepad++ Vulnerability Let Attacker Gains Complete System Control

A severe privilege escalation vulnerability has been discovered in Notepad++ version 8.8.1, potentially exposing millions of users worldwide to complete…

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls
23
Jun
2025

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls

Summary 1. CVE-2025-49825 allows attackers to remotely bypass Teleport’s authentication controls, affecting multiple versions of the secure access platform. 2. Teleport…

1inch rolls out expanded bug bounties with rewards up to $500K
23
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts, wallet and infrastructure. A community-first approach to…