Category: CyberSecurityNews

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code
03
Jun
2025

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Google has released an emergency security update for Chrome after confirming that a critical zero-day vulnerability is being actively exploited…

Haozi's Plug-and-Play Phishing Attack Stolen Over $280,000 From Users
03
Jun
2025

Haozi’s Plug-and-Play Phishing Attack Stolen Over $280,000 From Users

A sophisticated phishing-as-a-service operation known as Haozi has emerged as a significant threat in the cybercriminal landscape, facilitating over $280,000…

A FakeCaptcha Kit That Trick Users to Run Code via The Windows Run Command
03
Jun
2025

A FakeCaptcha Kit That Trick Users to Run Code via The Windows Run Command

A new and sophisticated malware distribution framework dubbed “HuluCaptcha” has emerged, leveraging fake CAPTCHA verification pages to trick users into…

Threat Actors Using ClickFix Technique to Deliver EddieStealer Malware
03
Jun
2025

Threat Actors Using ClickFix Technique to Deliver EddieStealer Malware

Cybersecurity researchers have identified a sophisticated new malware campaign leveraging the deceptive ClickFix technique to distribute EddieStealer, a dangerous information-stealing…

Prioritizing Vulnerabilities in a Sea of Alerts
03
Jun
2025

Prioritizing Vulnerabilities in a Sea of Alerts

According to recent industry analysis, cybersecurity professionals are overwhelmed by a flood of security alerts. Organizations process an average of…

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction
02
Jun
2025

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction

Multiple critical security vulnerabilities affecting MediaTek smartphones, tablets, and IoT chipsets could allow attackers to escalate privileges and compromise device…

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection
02
Jun
2025

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection

Significant vulnerabilities were uncovered in pre-installed applications on Ulefone and Krüger&Matz Android smartphones that expose users to significant risks, including…

DSPM vs. DLP : Understanding the Key Differences
02
Jun
2025

DSPM vs. DLP : Understanding the Key Differences

Modern organizations face a growing challenge in protecting sensitive data. As more people adopt the cloud and rules get tougher,…

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users
02
Jun
2025

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users

Mobile chipmaker Qualcomm has issued urgent security patches for three critical zero-day vulnerabilities in its Adreno GPU drivers that are…

Future of Passwords Biometrics and Passwordless Authentication
02
Jun
2025

Future of Passwords Biometrics and Passwordless Authentication

The digital authentication landscape is dramatically transforming as passwordless technologies gain unprecedented momentum. Passkey adoption surging 400% in 2024 alone….

Ransomware Negotiation When and How to Engage Attackers
02
Jun
2025

Ransomware Negotiation When and How to Engage Attackers

As ransomware attacks devastate organizations globally, many companies are turning to professional negotiators to engage directly with cybercriminals, despite strong…

50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint
02
Jun
2025

50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint

A critical security vulnerability affecting over 50,000 Azure Active Directory users has been discovered, exposing sensitive employee data through an…