Category: CyberSecurityNews

Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials
27
Jun
2025

Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials

A sophisticated new malware campaign targeting macOS users has emerged, employing deceptive “Clickfix” tactics to distribute malicious AppleScripts designed to…

MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition
27
Jun
2025

MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition

A critical pre-authentication denial of service vulnerability was identified as CVE-2025-6709, affecting multiple versions of MongoDB Server across its 6.0,…

Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger
26
Jun
2025

Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger

The Androxgh0st botnet has significantly expanded its operations since 2023, with cybercriminals now compromising prestigious academic institutions to host their…

TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts
26
Jun
2025

TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts

A sophisticated cyberattack campaign has weaponized a legitimate penetration testing framework to compromise thousands of Microsoft cloud accounts across hundreds…

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks
26
Jun
2025

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks

CISA has issued a critical warning regarding a Fortinet FortiOS vulnerability that poses significant risks to network security infrastructure.  On…

Multiple Brother Devices Vulnerabilities Open Devices for Hacking
26
Jun
2025

Multiple Brother Devices Vulnerabilities Open Devices for Hacking

A comprehensive security research investigation has unveiled eight critical vulnerabilities affecting 742 printer and multifunction device models across four major…

Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices
26
Jun
2025

Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices

A sophisticated Android phishing campaign has emerged across India, exploiting the cultural significance of wedding invitations to distribute malicious software….

New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample
26
Jun
2025

New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample

Cybersecurity researchers have discovered a groundbreaking new malware strain that represents the first documented attempt to weaponize prompt injection attacks…

Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested
26
Jun
2025

Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested

French authorities have dismantled a major cybercrime operation, arresting five hackers who operated BreachForum, one of the world’s largest marketplaces…

New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection 
26
Jun
2025

New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection 

Security researchers at ANY.RUN have uncovered a new malware campaign delivering the BRAODO Stealer, which relies on public GitHub repositories…

Firefox 140 Released With Fix for Code Execution Vulnerability
26
Jun
2025

Firefox 140 Released With Fix for Code Execution Vulnerability

Mozilla has released Firefox 140, addressing multiple critical security vulnerabilities, including a high-impact use-after-free vulnerability that could lead to code…

Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process
26
Jun
2025

Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process

A significant security vulnerability has been identified in Realtek’s RTL8762E SDK v1.4.0 that allows attackers to exploit the Bluetooth Low…