Category: CyberSecurityNews

Beware of Fake Timesheet Report Email Leading to the Tycoon 2FA Phishing Kit
18
Feb
2025

Beware of Fake Timesheet Report Email Leading to the Tycoon 2FA Phishing Kit

A new wave of phishing attacks is exploiting fake timesheet report emails to lure victims into the sophisticated Tycoon 2FA…

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection

New research reveals ransomware gangs are accelerating encryption timelines while adopting advanced evasion techniques and data extortion strategies. A 2025…

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely
17
Feb
2025

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely

A sophisticated malware campaign has recently been uncovered by security researchers at Sucuri, targeting WordPress websites through hidden malware and…

RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems
17
Feb
2025

RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems

The RansomHub ransomware group has rapidly emerged as one of the most prolific cybercrime syndicates of 2024–2025. As this ransomware…

Xerox Printers Vulnerability Let Attackers Capture Auth Data From LDAP & SMB
17
Feb
2025

Xerox Printers Vulnerability Let Attackers Capture Auth Data From LDAP & SMB

Multiple vulnerabilities in enterprise-grade Xerox Versalink C7025 multifunction printers (MFPs) enable attackers to intercept authentication credentials from Lightweight Directory Access…

CISA Warns of Apple iOS Vulnerability Exploited in Wild
17
Feb
2025

CISA Warns of Apple iOS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability in Apple…

New Android Security Feature that Blocks Changing Sensitive Setting During Calls
17
Feb
2025

New Android Security Feature that Blocks Changing Sensitive Setting During Calls

Google has unveiled a groundbreaking security feature in Android 16 Beta 2 aimed at combating phone scams by blocking users…

New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects 
17
Feb
2025

New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects 

Microsoft Threat Intelligence has identified an evolved iteration of the XCSSET malware family actively exploiting macOS developers via weaponized Xcode…

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration
17
Feb
2025

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration

A critical Insecure Direct Object Reference (IDOR) vulnerability was recently discovered in ExHub, a cloud-based platform for hulia-based development.  This…

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
17
Feb
2025

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication

Security researchers at Volexity have uncovered multiple Russian threat actors conducting sophisticated social engineering and spear-phishing campaigns targeting Microsoft 365…

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
17
Feb
2025

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number

The Indian Post Office portal was found vulnerable to an Insecure Direct Object Reference (IDOR) attack, exposing sensitive Know Your…

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
17
Feb
2025

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment

A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting users with fake Outlook troubleshooting calls. These calls, designed…