Category: CyberSecurityNews

Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks
08
May
2025

Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks

The cybersecurity landscape has witnessed a significant paradigm shift with Ransomware-as-a-Service (RaaS) emerging as the dominant business model for cybercriminals…

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers
08
May
2025

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers

Cisco has disclosed a critical security vulnerability in its IOS XE Wireless LAN Controllers that could allow unauthorized attackers to…

Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed
08
May
2025

Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed

The financial sector has emerged as a prime target for sophisticated ransomware operations, with a staggering 406 publicly disclosed incidents…

Agenda Ransomware Group Upgraded Their Arsenal With SmokeLoader and NETXLOADER
08
May
2025

Agenda Ransomware Group Upgraded Their Arsenal With SmokeLoader and NETXLOADER

In a significant evolution of their attack capabilities, the Agenda ransomware group has recently incorporated SmokeLoader malware and a new…

PoC Tool Released for Max Severity Apache Parquet Vulnerability to Detect Affected Servers
08
May
2025

PoC Tool Released for Max Severity Apache Parquet Vulnerability to Detect Affected Servers

A proof-of-concept (PoC) exploit tool has been publicly released for a maximum severity vulnerability in Apache Parquet, enabling security teams…

Europol Take Down DDoS-for-Hire Empire & Arrested 4 Admins
08
May
2025

Europol Take Down DDoS-for-Hire Empire & Arrested 4 Admins

In a major blow to the cybercriminal ecosystem, Polish authorities have arrested four individuals who allegedly operated a network of…

Wormable Linux Rootkit Attack Multiple Systems to Steal SSH Keys and Privilege Escalation
08
May
2025

Wormable Linux Rootkit Attack Multiple Systems to Steal SSH Keys and Privilege Escalation

Cybersecurity researchers at ANY.RUN have uncovered a sophisticated attack leveraging the Diamorphine rootkit to deploy a cryptocurrency miner on Linux…

UK Government Sets Timeline to Replace Passwords With Passkeys
08
May
2025

UK Government Sets Timeline to Replace Passwords With Passkeys

The UK government has unveiled plans to roll out passkey technology across its digital services as it seeks to reduce…

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information
08
May
2025

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information

A sophisticated banking trojan known as Lampion has resurfaced with an evolved attack strategy, now exploiting fake ClickFix utility lures…

DPRK's Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots
08
May
2025

DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots

North Korean state-sponsored hackers have executed what security experts are calling the largest cryptocurrency theft operation to date, successfully stealing…

Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025
07
May
2025

Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025

The healthcare industry has become increasingly vulnerable to sophisticated cyber threats in 2025, with malicious actors specifically targeting medical institutions’…

Critical Open Source Easyjson Library Under Full Control of Russian Company
07
May
2025

Critical Open Source Easyjson Library Under Full Control of Russian Company

A critical security revelation has sent shockwaves through the cybersecurity community as researchers uncovered that easyjson, a widely adopted open-source…