Category: CyberSecurityNews

Microsoft Investigating Forms Service Issue Not Accessible for Users
04
Jul
2025

Microsoft Investigating Forms Service Issue Not Accessible for Users

Microsoft is currently investigating a significant service disruption affecting Microsoft Forms, leaving numerous users unable to access the popular online…

Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users
04
Jul
2025

Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

A sophisticated mobile ad fraud operation dubbed “IconAds” has infiltrated Android devices worldwide through 352 malicious applications distributed via Google…

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
04
Jul
2025

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Critical security vulnerabilities have been discovered in PHP that could allow attackers to execute SQL injection attacks and cause denial…

Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
04
Jul
2025

Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks

A critical security vulnerability has been discovered in HIKVISION’s applyCT component, part of the HikCentral Integrated Security Management Platform, that…

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique
04
Jul
2025

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique

A sophisticated technique to bypass Content Security Policy (CSP) protections using a combination of HTML injection and browser cache manipulation. …

New "123 | Stealer" Advertised on Underground Hacking Forums for $120 Per Month
04
Jul
2025

New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month

A new credential-stealing malware dubbed “123 | Stealer” has surfaced on underground cybercrime forums, being marketed by threat actor “koneko”…

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
04
Jul
2025

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware

A sophisticated social engineering campaign has emerged targeting unsuspecting users through fraudulent Cloudflare verification screens, representing a new evolution in…

Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365
04
Jul
2025

Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365

A dramatic surge in password spray attacks targeting enterprise infrastructure, with Cisco ASA VPN systems experiencing an unprecedented 399% increase…

New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
04
Jul
2025

New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks

A sophisticated new botnet family has emerged in the cybersecurity landscape, demonstrating unprecedented innovation in malware design and attack methodologies….

Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
04
Jul
2025

Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Microsoft Azure’s role-based access control system has been found to contain critical security vulnerabilities that could expose enterprise networks to…

Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code
03
Jul
2025

Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code

Two high-severity vulnerabilities in Anthropic’s Model Context Protocol (MCP) Filesystem Server enable attackers to escape sandbox restrictions and execute arbitrary…

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
03
Jul
2025

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Critical vulnerabilities in Apache Tomcat and Apache Camel are being actively exploited by cybercriminals worldwide, with security researchers documenting over…