Category: CyberSecurityNews

Critical Craft CMS RCE 0-Day Vulnerability Exploited in Attacks to Steal Data
26
Apr
2025

Critical Craft CMS RCE 0-Day Vulnerability Exploited in Attacks to Steal Data

According to security researchers at CERT Orange Cyberdefense, a critical remote code execution (RCE) vulnerability in Craft CMS is actively…

Top 5 Cybersecurity Risks CISOs Must Tackle in 2025
26
Apr
2025

Top 5 Cybersecurity Risks CISOs Must Tackle in 2025

As we navigate 2025, Chief Information Security Officers (CISOs) must prepare for the Top 5 Cybersecurity Risks emerging from a…

DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models
26
Apr
2025

DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models

Despite significant disruptions by international law enforcement operations targeting major ransomware schemes, cybercriminal groups continue demonstrating remarkable adaptability in 2025….

New Power Parasites Phishing Attack Targeting Energy Companies and Major Brands
26
Apr
2025

New Power Parasites Phishing Attack Targeting Energy Companies and Major Brands

A sophisticated phishing campaign dubbed “Power Parasites” has been actively targeting global energy giants and major brands since 2024, according…

Leveraging Advanced Detection To Find Vulnerabilities
26
Apr
2025

Leveraging Advanced Detection To Find Vulnerabilities

Extended Detection and Response (XDR) has emerged as a transformative security technology that unifies visibility across multiple security layers. When…

How CISOs And SOC Heads Can Protect The Organization
26
Apr
2025

How CISOs And SOC Heads Can Protect The Organization

Social engineering has become the dominant attack vector in the modern cybersecurity landscape. As technical defenses evolve and strengthen, attackers…

How To Build A Data Center Security Strategy For 2025 And Beyond
26
Apr
2025

How To Build A Data Center Security Strategy For 2025 And Beyond

As the world becomes increasingly reliant on digital infrastructure, data centers have evolved into the backbone of business operations, cloud…

Hackers Allegedly Breach TikTok, Exposing Over 900,000 Usernames & Passwords
25
Apr
2025

Hackers Allegedly Breach TikTok, Exposing Over 900,000 Usernames & Passwords

A hacking collective identifying itself as R00TK1T has claimed responsibility for a massive data breach affecting TikTok, allegedly exposing the…

New Toolkit That Evades Microsoft Office 365 MFA
25
Apr
2025

New Toolkit That Evades Microsoft Office 365 MFA

A sophisticated new phishing toolkit named “SessionShark” has been specifically designed to circumvent Microsoft Office 365’s multi-factor authentication (MFA) protections….

FBI To Offer Reward Up to $10 Million Any Information on Salt Typhoon Hackers
25
Apr
2025

FBI To Offer Reward Up to $10 Million Any Information on Salt Typhoon Hackers

The Federal Bureau of Investigation announced today an unprecedented $10 million reward for actionable intelligence leading to the identification and…

Spring Security Vulnerability Let Attackers Determine Which Usernames are Valid
25
Apr
2025

Spring Security Vulnerability Let Attackers Determine Which Usernames are Valid

A serious vulnerability related to information exposure (CVE-2025-22234) impacts several versions of the spring-security-crypto package. The flaw enables attackers to…

Microsoft's Symlink Patch Created New Windows DoS Vulnerability
25
Apr
2025

Microsoft’s Symlink Patch Created New Windows DoS Vulnerability

A recent Microsoft security update, intended to patch a critical privilege escalation vulnerability, has inadvertently introduced a new and significant…