Category: CyberSecurityNews

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User
13
Jun
2025

Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User

A severe security vulnerability has been discovered in the Acer Control Center software, which could allow attackers to execute arbitrary…

Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions
13
Jun
2025

Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions

Microsoft 365 users across Asia Pacific, Europe, the Middle East, and Africa are experiencing significant authentication disruptions that are preventing…

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
13
Jun
2025

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the release of its new Vishing Simulation…

Kali Linux 2025.2 Released With New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
13
Jun
2025

Kali Linux 2025.2 Released With New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools

The penetration testing community has received a significant upgrade with the release of Kali Linux 2025.2, marking another milestone in…

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection
13
Jun
2025

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection

Despite sustained international pressure, sanctions, and public exposures over the past two years, the sophisticated Predator mobile spyware has demonstrated…

New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches
13
Jun
2025

New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches

A sophisticated new attack method called “SmartAttack” that can breach supposedly secure air-gapped computer systems using smartwatches as covert data…

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens
13
Jun
2025

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens

Cybersecurity researchers have identified a sophisticated new phishing campaign that exploits GitHub’s OAuth2 device authorization flow to compromise developer accounts…

HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
13
Jun
2025

HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit

A significant security vulnerability in HashiCorp Nomad workload orchestrator that allows attackers to escalate privileges by exploiting the Access Control…

Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists
13
Jun
2025

Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists

The advanced Graphite mercenary spyware, developed by Paragon, targets journalists through a sophisticated zero-click vulnerability in Apple’s iOS. At least…

Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider
13
Jun
2025

Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider

Cybersecurity researchers have uncovered a sophisticated ransomware campaign targeting utility billing software providers through unpatched vulnerabilities in SimpleHelp Remote Monitoring…

Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
13
Jun
2025

Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware

The Fog ransomware group has evolved beyond conventional attack methods, deploying an unprecedented arsenal of legitimate pentesting tools in a…

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers
13
Jun
2025

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers

A critical zero-day vulnerability in WebDAV implementations that enables remote code execution, with proof-of-concept exploit code now publicly available on…