Category: CyberSecurityNews

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References
23
Jun
2025

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References

Summary 1. Harmful Objective Concealed: Attacker defines a harmful goal but starts with benign prompts. 2. Context Poisoning: Introduces subtle…

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
23
Jun
2025

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague

The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL Conference 2025, taking place October 7–9, 2025, at the Vienna…

McLaren Health Care Data Breach Exposes 743,000 People Personal Information
23
Jun
2025

McLaren Health Care Data Breach Exposes 743,000 People Personal Information

McLaren Health Care, a major healthcare organization based in Grand Blanc, Michigan, has disclosed a significant data breach that compromised…

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs
23
Jun
2025

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs

This comprehensive guide provides SOC analysts and MSSP teams with practical threat hunting techniques using advanced threat intelligence platforms. Modern…

UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server
23
Jun
2025

UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server

Ukrainian government agencies have fallen victim to a sophisticated cyberattack campaign orchestrated by the UAC-0001 group, also known as APT28,…

Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails
23
Jun
2025

Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails

Summary 1. Microsoft Defender for Office 365 is introducing large language model (LLM) technology to provide clear, human-readable explanations for…

Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support
23
Jun
2025

Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support

Summary 1.  IPFire 2.29 Core Update 195 now includes fully integrated WireGuard protocol with web UI management, supporting both net-to-net…

APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack
23
Jun
2025

APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack

A Pakistan-based cyber espionage group known as APT36 or Transparent Tribe has launched a highly sophisticated phishing campaign targeting Indian…

CoinMarketCap Doodle Image Vulnerability Triggered Malicious Code Through an API Call
23
Jun
2025

CoinMarketCap Doodle Image Vulnerability Triggered Malicious Code Through an API Call

Summary 1. CoinMarketCap discovered a security flaw on June 20, 2025, in a homepage doodle image that executed malicious code…

Windows Screencast Snipping Tool Allow Users to Export Captures as GIF
23
Jun
2025

Windows Screencast Snipping Tool Allow Users to Export Captures as GIF

Summary 1. Microsoft has begun distributing Snipping Tool version 11.2505.21.0 to Windows Insiders in Canary and Dev Channels, introducing GIF…

SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play
23
Jun
2025

SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play

Cybersecurity researchers have uncovered a sophisticated new spyware campaign called SparkKitty that has successfully infiltrated both Apple’s App Store and…

BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware
23
Jun
2025

BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware

A sophisticated social engineering campaign leveraging the trusted Zoom platform has emerged as the latest weapon in the arsenal of…