Category: CyberSecurityNews

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack
14
Jul
2025

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

A Pune-based automobile parts manufacturer fell victim to a sophisticated man-in-the-middle (MITM) cyber attack, resulting in a loss of ₹2.35…

Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
14
Jul
2025

Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure

Threat actors have escalated their campaigns from crude ransomware splashes to precision-engineered strikes that can cripple an organisation’s very lifeblood—its…

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
14
Jul
2025

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload

A malicious Microsoft Compiled HTML Help (CHM) file uploaded from Poland on 30 June 2025 has shown how a legacy…

Louis Vuitton Hacked - Attackers Stolen Customers Personal Data
14
Jul
2025

Louis Vuitton Hacked – Attackers Stolen Customers Personal Data

Key Takeaways 1. Louis Vuitton confirmed a July 2 data breach affecting UK customers, the third LVMH attack in three…

Cybersecurity Isn’t Just For Experts Anymore: Why You Should Care
14
Jul
2025

Cybersecurity Isn’t Just For Experts Anymore: Why You Should Care

Let’s face it cybersecurity used to sound like a topic only for programmers in hoodies or government agencies trying to…

Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000
14
Jul
2025

Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000

A threat actor using the handle “zeroplayer” advertised a previously unknown remote-code-execution (RCE) exploit for WinRAR on an underground forum. …

Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack
14
Jul
2025

Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack

Grok-4 has been jailbroken using a new strategy that combines two different jailbreak methods to bypass artificial intelligence security measures….

Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails
14
Jul
2025

Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails

Security researchers have uncovered a significant vulnerability in Google Gemini for Workspace that enables threat actors to embed hidden malicious…

First Rowhammer Attack Targeting NVIDIA GPUs
12
Jul
2025

First Rowhammer Attack Targeting NVIDIA GPUs

Cybersecurity researchers at the University of Toronto have achieved a breakthrough in hardware-level attacks by successfully demonstrating GPUHammer, the first…

WordPress GravityForms Plugin Hacked to Include Malicious Code
12
Jul
2025

WordPress GravityForms Plugin Hacked to Include Malicious Code

A sophisticated supply chain attack has compromised the official GravityForms WordPress plugin, allowing attackers to inject malicious code that enables…

OpenAI is to Launch a AI Web Browser in Coming Weeks
12
Jul
2025

OpenAI is to Launch a AI Web Browser in Coming Weeks

OpenAI is reportedly preparing to release an artificial intelligence-enhanced web browser within the coming weeks, marking the company’s latest expansion…

Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
12
Jul
2025

Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability

Trendyol’s application security team uncovered a series of bypasses that render Meta’s Llama Firewall protections unreliable against sophisticated prompt injection…