Category: CyberSecurityNews

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly
10
May
2025

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly

In a coordinated effort, Lumen Technologies’ Black Lotus Labs, the U.S. Department of Justice (DOJ), the Federal Bureau of Investigation…

Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services
10
May
2025

Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services

Cybersecurity experts have identified an escalating campaign by the notorious hacker collective Scattered Spider, which continues to evolve its sophisticated…

5 Must-Have Security Features for Native Apps
10
May
2025

5 Must-Have Security Features for Native Apps

Native apps are built compatible with a platform or operating system, such as iOS or Android. While unrestricted access to…

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
10
May
2025

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads

A sophisticated supply chain attack targeting the popular npm package ‘rand-user-agent’ was discovered on May 5, 2025. The compromise affects…

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands
10
May
2025

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands

A new ransomware strain dubbed “Mamona” that operates entirely offline and leverages a clever attack strategy that abuses the Windows…

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands
10
May
2025

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands

A seemingly innocent Python package has been unmasked as a sophisticated remote access trojan (RAT) targeting the Discord developer community….

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results
10
May
2025

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results

Cybersecurity experts have uncovered a sophisticated attack campaign targeting IT administrators through search engine optimization (SEO) poisoning tactics. Threat actors…

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors
10
May
2025

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

A critical remote code execution vulnerability in SAP NetWeaver Visual Composer (CVE-2025-31324) is being actively exploited by a Chinese threat…

Threat Actors Attacking Job Seekers With Three New Unique Adversaries
10
May
2025

Threat Actors Attacking Job Seekers With Three New Unique Adversaries

A significant surge in sophisticated recruitment scams has emerged, with cybercriminals exploiting economic vulnerabilities and the competitive job market to…

Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters
08
May
2025

Radware Cloud Web App Firewall Vulnerability Let Attackers Bypass Filters

Security researchers have uncovered critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that could allow attackers to completely bypass…

Researchers Details macOS Remote Code Execution Vulnerability
08
May
2025

Researchers Details macOS Remote Code Execution Vulnerability

A critical remote code execution vulnerability identified in Apple’s macOS operating system, tracked as CVE-2024-44236. The vulnerability, which carries a…

Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks
08
May
2025

Ransomware-as-a-Service (RaaS) Evolved as a Predominant Framework for Ransomware Attacks

The cybersecurity landscape has witnessed a significant paradigm shift with Ransomware-as-a-Service (RaaS) emerging as the dominant business model for cybercriminals…