Category: CyberSecurityNews

How Threat Hunters Enrich Indicators With Context 
20
Mar
2025

How Threat Hunters Enrich Indicators With Context 

While data is king, context is his queen — together, they reign over domains that thrive on research, analysis, discovery,…

Microsoft Attributes Recent Outage of Outlook Web to Code Error in Recent Update
20
Mar
2025

Microsoft Attributes Recent Outage of Outlook Web to Code Error in Recent Update

Microsoft experienced a widespread outage on March 19, 2025, affecting Outlook on the web services. The tech giant has attributed…

RansomHub Affiliate Deploying New Custom Backdoor Dubbed 'Betruger' For Persistence
20
Mar
2025

RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence

A RansomHub affiliate has been observed recently deploying a new custom backdoor named ‘Betruger’. This sophisticated malware, discovered on March…

IBM AIX Vulnerability Let Attackers Execute Arbitrary Commands
20
Mar
2025

IBM AIX Vulnerability Let Attackers Execute Arbitrary Commands

Critical security vulnerabilities in IBM AIX operating systems could allow unauthorized remote attackers to execute arbitrary commands, potentially compromising the…

Rooted (Jailbroken) Mobile Devices 3.5 Times More Vulnerable to Cyber Attacks
20
Mar
2025

Rooted (Jailbroken) Mobile Devices 3.5 Times More Vulnerable to Cyber Attacks

A recent study has revealed that rooted devices are over 3.5 times more likely to be targeted by mobile malware,…

Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability 
20
Mar
2025

Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability 

Researchers have detected active exploitation attempts targeting two critical vulnerabilities in Cisco’s Smart Licensing Utility that were patched approximately six…

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
20
Mar
2025

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers

A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files. The…

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges
20
Mar
2025

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges

A severe vulnerability in the Linux kernel has remained undetected for nearly two decades, allowing local users to gain root…

Attackers Embedding Malicious Word file into a PDF to Evade Detections
20
Mar
2025

Attackers Embedding Malicious Word file into a PDF to Evade Detections

A sophisticated attack vector dubbed “MalDoc in PDF” allows threat actors to bypass traditional security scanning by embedding malicious Word…

41% of Success Logins Across Websites Involves Compromised Passwords
20
Mar
2025

41% of Success Logins Across Websites Involves Compromised Passwords

Password reuse continues to be one of the most significant security vulnerabilities in 2025, with alarming new data showing nearly…

vUS Sperm Donor Giant California Cryobank Hacked
20
Mar
2025

vUS Sperm Donor Giant California Cryobank Hacked

California Cryobank LLC, one of America’s largest sperm donor repositories, has confirmed a significant data breach that exposed sensitive customer…

Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation
20
Mar
2025

Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation

A sophisticated attack employing Legacy Driver Exploitation technique has emerged as a significant cybersecurity threat, according to a recent security…