Category: CyberSecurityNews

What Is Cyber Threat Intelligence: Quick Guide For CISOs 
03
Jun
2025

What Is Cyber Threat Intelligence: Quick Guide For CISOs 

Cyber threat intelligence (CTI) is the practice of collecting, analyzing, and transforming data about cyber threats into actionable insights to…

Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities
03
Jun
2025

Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities

Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft…

Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication
03
Jun
2025

Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication

Microsoft Edge for Android is rolling out an enhanced privacy feature that allows users to secure their InPrivate browsing sessions…

Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents
03
Jun
2025

Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents

A high-severity vulnerability was uncovered in Splunk Universal Forwarder for Windows that compromises directory access controls.  The flaw, designated CVE-2025-20298…

New Safari XSS Flaw Leverages JavaScript Error Handling to Execute Arbitrary Code
03
Jun
2025

New Safari XSS Flaw Leverages JavaScript Error Handling to Execute Arbitrary Code

A new cross-site scripting (XSS) vulnerability in Safari that exploits the browser’s TypeError exception handling mechanism to execute arbitrary JavaScript…

Beware of Fake Booking.com Sites That Infects Your Devices With AsyncRAT
03
Jun
2025

Beware of Fake Booking.com Sites That Infects Your Devices With AsyncRAT

Cybercriminals have launched a sophisticated campaign targeting travelers through fake Booking.com websites that deploy AsyncRAT malware, according to recent security…

Malicious NPM Packages Attacking Ethereum Wallets Using Obfuscated JavaScript
03
Jun
2025

Malicious NPM Packages Attacking Ethereum Wallets Using Obfuscated JavaScript

A sophisticated cryptocurrency theft campaign has emerged on the npm package registry, targeting developers and cryptocurrency users through malicious packages…

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation
03
Jun
2025

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation

A significant vulnerability, CVE-2025-26396, affects the SolarWinds Dameware Mini Remote Control Service could allow attackers to escalate privileges on affected…

New ModSecurity WAF Vulnerability Let Attackers Crash the System
03
Jun
2025

New ModSecurity WAF Vulnerability Let Attackers Crash the System

A significant denial of service vulnerability has been discovered in ModSecurity, one of the most widely deployed open-source web application…

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely
03
Jun
2025

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Multiple security vulnerabilities in Hewlett-Packard Enterprise (HPE) StoreOnce software platform that could allow remote attackers to execute malicious code, bypass…

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code
03
Jun
2025

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

A significant security vulnerability in the Splunk Enterprise platform could allow low-privileged attackers to execute unauthorized JavaScript code through a…

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads
03
Jun
2025

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads

Cybercriminals are increasingly leveraging misconfigured artificial intelligence tools to execute sophisticated attacks that generate and deploy malicious payloads automatically, marking…