Category: CyberSecurityNews

ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger
29
May
2025

ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger

Cybersecurity researchers have uncovered a sophisticated new attack method called “ChoiceJacking” that allows malicious charging stations to steal sensitive data…

Building a Cyber-Resilient Organization in 2025
29
May
2025

Building a Cyber-Resilient Organization in 2025

As 2025 unfolds, the digital battleground has never been more complex-or more consequential. Cyberattacks are no longer isolated incidents but…

Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition
29
May
2025

Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition

Zscaler Inc. announced on May 27, 2025, a definitive agreement to acquire Red Canary, a leading Managed Detection and Response…

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware
28
May
2025

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware

Cybercriminals leveraged critical vulnerabilities in remote monitoring software to breach a managed service provider and attack multiple customers. Cybersecurity researchers…

Wordpress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack
28
May
2025

WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

A critical security vulnerability in the popular TI WooCommerce Wishlist plugin has left over 100,000 WordPress websites exposed to potential…

93+ Billion Stolen Users' Cookies Flooded by Hackers on the Dark Web
28
May
2025

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Security researchers have uncovered a significant cybercrime operation involving 93.7 billion stolen browser cookies circulating on dark web marketplaces, representing…

Incident Response Planning - Preparing for Data Breaches
28
May
2025

Incident Response Planning – Preparing for Data Breaches

As the digital threat landscape intensifies and new technologies reshape business operations, cybersecurity budgeting in 2025 will be significantly transformed….

3 SOC Metrics Improved With Sandbox Analysis 
28
May
2025

3 SOC Metrics Improved With Sandbox Analysis 

SOC teams are flooded with alerts, but what really matters is how quickly they can detect, investigate, and respond. When…

Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data
28
May
2025

Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data

Cybercriminals have increasingly targeted Docusign, the popular electronic signature platform, to orchestrate sophisticated phishing campaigns aimed at stealing corporate credentials…

XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code
28
May
2025

XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code

Three critical vulnerabilities in XenServer VM Tools for Windows allow attackers to execute arbitrary code and escalate privileges within guest…

The Future of Cybersecurity - Trends Shaping the Industry
28
May
2025

The Future of Cybersecurity – Trends Shaping the Industry

As digital transformation accelerates across industries, the cybersecurity landscape is changing. 2025 marks a pivotal moment, with organizations worldwide facing…

251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points
28
May
2025

251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points

A highly coordinated reconnaissance campaign that deployed 251 malicious IP addresses in a single-day operation targeting cloud-based infrastructure.  The attack,…