Category: CyberSecurityNews

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely
03
Jun
2025

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Multiple security vulnerabilities in Hewlett-Packard Enterprise (HPE) StoreOnce software platform that could allow remote attackers to execute malicious code, bypass…

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code
03
Jun
2025

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

A significant security vulnerability in the Splunk Enterprise platform could allow low-privileged attackers to execute unauthorized JavaScript code through a…

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads
03
Jun
2025

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads

Cybercriminals are increasingly leveraging misconfigured artificial intelligence tools to execute sophisticated attacks that generate and deploy malicious payloads automatically, marking…

SentinelOneOutage Root Cause
03
Jun
2025

SentinelOne Global Service Outage Root Cause Revealed

Cybersecurity company SentinelOne has released a comprehensive root cause analysis revealing that a software flaw in an infrastructure control system…

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code
03
Jun
2025

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Google has released an emergency security update for Chrome after confirming that a critical zero-day vulnerability is being actively exploited…

Haozi's Plug-and-Play Phishing Attack Stolen Over $280,000 From Users
03
Jun
2025

Haozi’s Plug-and-Play Phishing Attack Stolen Over $280,000 From Users

A sophisticated phishing-as-a-service operation known as Haozi has emerged as a significant threat in the cybercriminal landscape, facilitating over $280,000…

A FakeCaptcha Kit That Trick Users to Run Code via The Windows Run Command
03
Jun
2025

A FakeCaptcha Kit That Trick Users to Run Code via The Windows Run Command

A new and sophisticated malware distribution framework dubbed “HuluCaptcha” has emerged, leveraging fake CAPTCHA verification pages to trick users into…

Threat Actors Using ClickFix Technique to Deliver EddieStealer Malware
03
Jun
2025

Threat Actors Using ClickFix Technique to Deliver EddieStealer Malware

Cybersecurity researchers have identified a sophisticated new malware campaign leveraging the deceptive ClickFix technique to distribute EddieStealer, a dangerous information-stealing…

Prioritizing Vulnerabilities in a Sea of Alerts
03
Jun
2025

Prioritizing Vulnerabilities in a Sea of Alerts

According to recent industry analysis, cybersecurity professionals are overwhelmed by a flood of security alerts. Organizations process an average of…

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction
02
Jun
2025

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction

Multiple critical security vulnerabilities affecting MediaTek smartphones, tablets, and IoT chipsets could allow attackers to escalate privileges and compromise device…

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection
02
Jun
2025

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection

Significant vulnerabilities were uncovered in pre-installed applications on Ulefone and Krüger&Matz Android smartphones that expose users to significant risks, including…

DSPM vs. DLP : Understanding the Key Differences
02
Jun
2025

DSPM vs. DLP : Understanding the Key Differences

Modern organizations face a growing challenge in protecting sensitive data. As more people adopt the cloud and rules get tougher,…