Category: CyberSecurityNews

ANY.RUN Now Let SOC/DFIR Team Analse Android APK Malware With Sandbox
20
Mar
2025

ANY.RUN Now Let SOC/DFIR Team Analse Android APK Malware With Sandbox

ANY.RUN, the interactive malware analysis platform has announced full support for Android OS in its cloud-based sandbox environment, enabling security…

Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks
20
Mar
2025

Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks

Cybersecurity experts have identified a persistent trend of threat actors exploiting legitimate remote monitoring and management (RMM) software to infiltrate…

A Revolutionary CNAPP For Preventive Cybersecurity
20
Mar
2025

A Revolutionary CNAPP For Preventive Cybersecurity

Moving Beyond Detection to Real-Time, Automated Security Across Workloads, Cloud, and Infrastructure  SecPod, a global cybersecurity provider, has announced the…

Kali Linux 2025.1a New Tool & Upates to Desktop Environments
20
Mar
2025

Kali Linux 2025.1a New Tool & Upates to Desktop Environments

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has officially unveiled its latest release, Kali Linux 2025.1a. This update not only significantly enhances desktop environments but also…

MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox
19
Mar
2025

MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox

The China-aligned advanced persistent threat (APT) group MirrorFace has updated its tactics, techniques, and procedures (TTPs) with a sophisticated approach…

VPN Vulnerabilities Emerges As The Key Tool for Threat Actors to Attack Organizations
19
Mar
2025

VPN Vulnerabilities Emerges As The Key Tool for Threat Actors to Attack Organizations

VPN infrastructure has become a prime target for cybercriminals and state-sponsored actors, with vulnerabilities in these systems serving as gateways…

Sophisticated Attack Via Booking Websites Installs LummaStealer Malware
19
Mar
2025

Sophisticated Attack Via Booking Websites Installs LummaStealer Malware

Cybercriminals have launched a new sophisticated attack campaign targeting travelers through fake booking websites. The campaign, discovered in early 2025,…

Beware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet Credentials
19
Mar
2025

Beware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet Credentials

A sophisticated phishing campaign is targeting cryptocurrency investors with fraudulent emails claiming a mandatory Coinbase wallet migration requirement. These deceptive…

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code
19
Mar
2025

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code

A severe vulnerability in Synology’s DiskStation Manager (DSM) allows remote attackers to execute arbitrary code with no user interaction.  The…

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing
19
Mar
2025

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing

A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user…

CISA Warns of Fortinet FortiOS Authentication Bypass Vulnerability
19
Mar
2025

CISA Warns of Fortinet FortiOS Authentication Bypass Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert highlighting a significant vulnerability in Fortinet’s FortiOS…

Cloudflare to Implement Post-Quantum Cryptography to Defend Attacks from Quantum Computers
18
Mar
2025

Cloudflare to Implement Post-Quantum Cryptography to Defend Attacks from Quantum Computers

Cloudflare has announced the first phase of end-to-end quantum readiness for its Zero Trust platform, enabling organizations to protect their…