Category: CyberSecurityNews

New Attack “nRootTag” Turns 1.5 Billion iPhones as Free Tracking Agents
27
Feb
2025

New Attack “nRootTag” Turns 1.5 Billion iPhones as Free Tracking Agents

A new attack dubbed nRootTag has exposed over 1.5 billion Apple devices, including iPhones, iPads, Apple Watches, and Macs, to…

CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild
26
Feb
2025

CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent advisory on February 25, 2025, confirming that threat actors…

GitVenom Campaign Abusing Thousands of GitHub Repositories To Infect Users
25
Feb
2025

GitVenom Campaign Abusing Thousands of GitHub Repositories To Infect Users

A sophisticated malware campaign dubbed “GitVenom” has exploited GitHub’s open-source ecosystem to distribute malicious code through thousands of fraudulent repositories,…

Sliver C2 Server Vulnerability Let Attackers Open a TCP connection to Read Traffic
25
Feb
2025

Sliver C2 Server Vulnerability Let Attackers Open a TCP connection to Read Traffic

A critical server-side request forgery (SSRF) vulnerability (CVE-2025-27090) has been identified in the Sliver C2 framework’s teamserver implementation, enabling attackers…

UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure
25
Feb
2025

UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure

A sophisticated threat cluster tracked as UAC-0212 has escalated efforts to compromise critical infrastructure systems in Ukraine, according to a…

LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users
25
Feb
2025

LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users

The LightSpy advanced persistent threat (APT) group has significantly upgraded its surveillance capabilities with a 100+ command framework targeting Android,…

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site
25
Feb
2025

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site

Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website.  This…

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings
25
Feb
2025

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings

INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small…

200 Malicious GitHub Repos Attacking Developers to Deliver Malware
25
Feb
2025

200 Malicious GitHub Repos Attacking Developers to Deliver Malware

In an era where open-source collaboration drives software innovation, a sophisticated cyber campaign dubbed GitVenom has emerged as a critical…

16 Malicious Chrome Extensions Infected Over 3.2 Million Users
25
Feb
2025

16 Malicious Chrome Extensions Infected Over 3.2 Million Users

A coordinated campaign involving at least 16 malicious Chrome extensions infected over 3.2 million users worldwide, leveraging browser security vulnerabilities…

Research Jailbreaked OpenAI o1/o3, DeepSeek-R1, & Gemini 2.0 Flash Thinking Models
25
Feb
2025

Research Jailbreaked OpenAI o1/o3, DeepSeek-R1, & Gemini 2.0 Flash Thinking Models

A recent study from a team of cybersecurity researchers has revealed severe security flaws in commercial-grade Large Reasoning Models (LRMs),…

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass
25
Feb
2025

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass

A newly disclosed vulnerability in the GRUB2 bootloader’s read command (CVE-2025-0690) has raised concerns about potential Secure Boot bypasses and…