Category: CyberSecurityNews

Technical Analysis Published for OpenSSH's Agent Forwarding RCE Vulnerability
31
Mar
2025

Technical Analysis Published for OpenSSH’s Agent Forwarding RCE Vulnerability

Security researchers have published a detailed technical analysis of a critical remote code execution (RCE) vulnerability (CVE-2023-38408) in OpenSSH’s agent…

Critical PHP Vulnerability Let Hackers Bypass the Validation To Load Malicious Content 
31
Mar
2025

Critical PHP Vulnerability Let Hackers Bypass the Validation To Load Malicious Content 

A critical vulnerability in PHP’s libxml streams has been identified, potentially impacting web applications that rely on the DOM or…

Hackers Employ New ClickFix Captcha Technique to Deliver Ransomware
30
Mar
2025

Hackers Employ New ClickFix Captcha Technique to Deliver Ransomware

A sophisticated social engineering technique known as ClickFix has emerged, leveraging fake CAPTCHA verification processes to deceive users into executing…

TsarBot Android Malware Mimics 750 Banking & Finance Apps to Steal Credentials
30
Mar
2025

TsarBot Android Malware Mimics 750 Banking & Finance Apps to Steal Credentials

A newly discovered Android banking malware named TsarBot is targeting over 750 applications globally, including banking, finance, cryptocurrency, and e-commerce…

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers
30
Mar
2025

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers

A critical vulnerability in Apache Tomcat has been actively exploited by attackers to achieve remote code execution (RCE) on vulnerable…

Lotus Blossom APT Exploits WMI for Post-Exploitation Activities
29
Mar
2025

Lotus Blossom APT Exploits WMI for Post-Exploitation Activities

The Lotus Blossom Advanced Persistent Threat (APT) group, also known as Lotus Panda, Billbug, and Spring Dragon, has intensified its…

CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability
29
Mar
2025

CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a Malware Analysis Report (MAR-25993211-r1.v1) detailing the exploitation of a critical…

Fake Snow White Movie Attacking Viewers Device With New Malware
29
Mar
2025

Fake Snow White Movie Attacking Viewers Device With New Malware

Disney’s latest release, Snow White (2025), has turned into a cybersecurity crisis for unsuspecting users. With a disappointing IMDb rating…

A New Android Malware Remotely Control Your Android Devices
29
Mar
2025

A New Android Malware Remotely Control Your Android Devices

Researchers has identified a novel mobile banking Trojan, designated “Crocodilus,” marking a significant advancement in the evolution of Android-targeted malware….

Hackers Leveraging DNS MX Records To Dynamically Create Fake Logins Mimic as 100+ Brands
29
Mar
2025

Hackers Leveraging DNS MX Records To Dynamically Create Fake Logins Mimic as 100+ Brands

A sophisticated phishing operation has emerged that creatively leverages DNS mail exchange (MX) records to dynamically serve fake login pages…

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk
29
Mar
2025

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates…

Red Team Activities Turns More Sophisticated With The Progress of Artificial Intelligence
29
Mar
2025

Red Team Activities Turns More Sophisticated With The Progress of Artificial Intelligence

Artificial intelligence has dramatically transformed the cybersecurity landscape, with red team activities increasingly leveraging sophisticated AI-driven techniques to simulate advanced…