Category: CyberSecurityNews

CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog
11
Mar
2025

CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog

CISA has likely added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181, to its Known Exploited Vulnerabilities (KEV) catalog due to active…

New North Korean Moonstone Sleet Employs Creative Tactics To Deploy Custom Ransomware
10
Mar
2025

New North Korean Moonstone Sleet Employs Creative Tactics To Deploy Custom Ransomware

Cybersecurity researchers have identified a sophisticated ransomware campaign attributed to a North Korean threat actor dubbed “Moonstone Sleet.” The group…

1 Million Devices Infected by Malwares Hosted on GitHub, Microsoft Warns
10
Mar
2025

1 Million Devices Infected by Malwares Hosted on GitHub, Microsoft Warns

Microsoft Threat Intelligence detected a large-scale malvertising campaign in early December 2024 that infected nearly one million devices globally in…

Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner
08
Mar
2025

Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner

Security researchers have uncovered a sophisticated malware campaign where threat actors are coercing popular YouTubers to distribute SilentCryptoMiner malware disguised…

Getting Access to Internal Networks Via Physical Pentest
08
Mar
2025

Getting Access to Internal Networks Via Physical Pentest

Physical penetration testing provides crucial insights into real-world security vulnerabilities that might be overlooked in purely digital assessments. A recent…

YouTube Warns of Phishing Emails Attacking Creators to Steal Login Credentials
07
Mar
2025

YouTube Warns of Phishing Emails Attacking Creators to Steal Login Credentials

YouTube has issued an urgent alert to content creators regarding a highly sophisticated phishing campaign exploiting AI-generated deepfake technology to…

Multiple Jenkins Vulnerability Let Attackers Expose Secrets
07
Mar
2025

Multiple Jenkins Vulnerability Let Attackers Expose Secrets

Jenkins, the widely adopted open-source automation server central to CI/CD pipelines, has disclosed four critical security vulnerabilities enabling unauthorized secret…

New Malware Attacked 'Desert Dexter' Compromised 900+ Victims Worldwide
07
Mar
2025

New Malware Attacked ‘Desert Dexter’ Compromised 900+ Victims Worldwide

Security researchers at Positive Technologies have uncovered a sophisticated malware campaign dubbed “Desert Dexter” that has compromised more than 900…

Beware of Fake Tax Claims that Tricks Users to Steal Over $10,000 From Victims
07
Mar
2025

Beware of Fake Tax Claims that Tricks Users to Steal Over $10,000 From Victims

Tax season has become a high-stakes battleground for cybercriminals, who leverage advanced technologies like deepfake audio and AI-generated phishing campaigns…

Linux Distro Tails 6.13 Released with Improved Wi-Fi Hardware Detection
07
Mar
2025

Linux Distro Tails 6.13 Released with Improved Wi-Fi Hardware Detection

The Tails Project announced the release of Tails 6.13 on March 6, 2025, marking a significant update to its privacy-centric…

Beware of Fake CAPTCHA Prompts That May Silently Install LummaStealer on Your Device
07
Mar
2025

Beware of Fake CAPTCHA Prompts That May Silently Install LummaStealer on Your Device

Cybersecurity researchers at G DATA have uncovered a sophisticated malware campaign using fake CAPTCHA prompts to deliver LummaStealer, a dangerous…

Hackers Leveraging x86-64 Binaries on Apple Silicon to Deploy macOS malware
07
Mar
2025

Hackers Leveraging x86-64 Binaries on Apple Silicon to Deploy macOS malware

Advanced threat actors increasingly leverage x86-64 binaries and Apple’s Rosetta 2 translation technology to bypass execution policies and deploy malware…