Category: CyberSecurityNews

Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges
23
Jun
2025

Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges

Summary 1.  Overprivileged containers can steal AWS credentials by targeting the 169.254.170.23:80 endpoint through packet sniffing and API spoofing attacks….

NCSC Warns of 'UMBRELLA STAND' Malware Attacking Fortinet FortiGate Firewalls
23
Jun
2025

NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls

The UK’s National Cyber Security Centre (NCSC) has issued a critical warning about a sophisticated malware campaign dubbed “UMBRELLA STAND”…

Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS
22
Jun
2025

Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS

A threat actor has reportedly put up for sale a sophisticated FortiGate API exploit tool on a dark web marketplace,…

CodeSign Secure v3.02: Future of Code Signing with PQC
21
Jun
2025

CodeSign Secure v3.02: Future of Code Signing with PQC

In an era where cyber threats are becoming increasingly sophisticated and quantum computing looms on the horizon, traditional digital security…

OpenVPN Driver Vulnerability Let Attackers to Crash Windows Systems
21
Jun
2025

OpenVPN Driver Vulnerability Let Attackers to Crash Windows Systems

Summary 1. A critical OpenVPN Windows driver flaw (CVE-2025-50054) allowed local attackers to crash systems. 2. The vulnerability enabled denial-of-service…

DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats
21
Jun
2025

DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats

DuckDuckGo has significantly upgraded its Scam Blocker feature to protect users against a broader range of digital threats, including sham…

How Smart Timesheet Software Is Changing the Way of Work
21
Jun
2025

How Smart Timesheet Software Is Changing the Way of Work

As an employee have been managing projects in remote, hybrid, and traditional work environments, employees have always faced the same…

Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware
21
Jun
2025

Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware

Cybercriminals have discovered a sophisticated new method to distribute malicious remote access tools by exploiting Vercel, a legitimate frontend hosting…

Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection
21
Jun
2025

Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection

A severe security vulnerability has been discovered in the widely-used Insomnia API Client that allows attackers to execute arbitrary code…

Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware
21
Jun
2025

Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware

A sophisticated malware campaign targeting ComfyUI, a popular AI image generation framework, has successfully compromised at least 695 servers worldwide,…

Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number
21
Jun
2025

Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number

In a concerning development for internet users, cybercriminals have devised a sophisticated new technique to manipulate Google search results, effectively…

Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
21
Jun
2025

Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads

A sophisticated new threat actor known as Mocha Manakin has emerged in the cybersecurity landscape, employing an increasingly popular social…