Category: CyberSecurityNews

Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats
13
May
2025

Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats

A disturbing pattern of security failures in the firmware supply chain continues to expose millions of devices to pre-OS threats,…

F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
13
May
2025

F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands

F5 Networks has disclosed a high-severity command injection vulnerability (CVE-2025-31644) in its BIG-IP products running in Appliance mode.  The vulnerability…

Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks
12
May
2025

Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks

The global cost of cybercrime is projected to reach $10.5 trillion annually by 2025, underscoring the unprecedented scale of digital…

Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data
12
May
2025

Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data

Multiple vulnerabilities in Microsoft’s Copilot AI for SharePoint, enabling attackers to access sensitive corporate data including passwords, API keys, and…

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability
12
May
2025

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability

A critical Proof-of-Concept (PoC) exploit has been released for a significant vulnerability in the Linux kernel’s nftables subsystem, tracked as…

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis
12
May
2025

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis

Cybersecurity experts have identified a sophisticated phishing technique that exploits blob URIs (Uniform Resource Identifiers) to evade detection by Secure…

Critical Vulnerabilities in Mitel SIP Phones Let Attackers Inject Malicious Commands
12
May
2025

Critical Vulnerabilities in Mitel SIP Phones Let Attackers Inject Malicious Commands

Security researchers have discovered two significant vulnerabilities affecting Mitel’s suite of SIP phones that could allow attackers to execute arbitrary…

Defendnot Disables Windows Defender by Posing as an Antivirus Solution
12
May
2025

Defendnot Disables Windows Defender by Posing as an Antivirus Solution

Defendnot, a sophisticated new tool that effectively disables Windows Defender by exploiting the Windows Security Center (WSC) API to register…

Microsoft Teams To Block Screen Capture During Meetings
11
May
2025

Microsoft Teams To Block Screen Capture During Meetings

Microsoft has announced a new “Prevent Screen Capture” feature for Teams that will block unauthorized screenshots during meetings. The feature,…

"PupkinStealer" A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram
10
May
2025

“PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram

A newly identified information-stealing malware, dubbed PupkinStealer, Developed in C# using the .NET framework, this lightweight yet effective malware targets…

Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers
10
May
2025

Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers

As artificial intelligence (AI) tools gain mainstream traction for content creation, cybercriminals are capitalizing on the hype with a sophisticated…

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly
10
May
2025

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly

In a coordinated effort, Lumen Technologies’ Black Lotus Labs, the U.S. Department of Justice (DOJ), the Federal Bureau of Investigation…