Category: CyberSecurityNews

Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services
10
May
2025

Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services

Cybersecurity experts have identified an escalating campaign by the notorious hacker collective Scattered Spider, which continues to evolve its sophisticated…

5 Must-Have Security Features for Native Apps
10
May
2025

5 Must-Have Security Features for Native Apps

Native apps are built compatible with a platform or operating system, such as iOS or Android. While unrestricted access to…

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
10
May
2025

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads

A sophisticated supply chain attack targeting the popular npm package ‘rand-user-agent’ was discovered on May 5, 2025. The compromise affects…

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands
10
May
2025

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands

A new ransomware strain dubbed “Mamona” that operates entirely offline and leverages a clever attack strategy that abuses the Windows…

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands
10
May
2025

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands

A seemingly innocent Python package has been unmasked as a sophisticated remote access trojan (RAT) targeting the Discord developer community….

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results
10
May
2025

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results

Cybersecurity experts have uncovered a sophisticated attack campaign targeting IT administrators through search engine optimization (SEO) poisoning tactics. Threat actors…

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors
10
May
2025

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

A critical remote code execution vulnerability in SAP NetWeaver Visual Composer (CVE-2025-31324) is being actively exploited by a Chinese threat…

Threat Actors Attacking Job Seekers With Three New Unique Adversaries
10
May
2025

Threat Actors Attacking Job Seekers With Three New Unique Adversaries

A significant surge in sophisticated recruitment scams has emerged, with cybercriminals exploiting economic vulnerabilities and the competitive job market to…

Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters
08
May
2025

Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters

Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass…

Researchers Details macOS Remote Code Execution Vulnerability
08
May
2025

Researchers Details macOS Remote Code Execution Vulnerability

A critical remote code execution vulnerability identified in Apple’s macOS operating system, tracked as CVE-2024-44236. The vulnerability, which carries a…

Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks
08
May
2025

Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks

The cybersecurity landscape has witnessed a significant paradigm shift with Ransomware-as-a-Service (RaaS) emerging as the dominant business model for cybercriminals…

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers
08
May
2025

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers

Cisco has disclosed a critical security vulnerability in its IOS XE Wireless LAN Controllers that could allow unauthorized attackers to…