Category: CyberSecurityNews

Microsoft SharePoint Connector Vulnerability Let Attackers Steal User’s Credentials
10
Feb
2025

Microsoft SharePoint Connector Vulnerability Let Attackers Steal User’s Credentials

A critical server-side request forgery (SSRF) vulnerability in Microsoft Power Platform’s SharePoint connector allowed attackers to harvest user credentials and…

LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release
10
Feb
2025

LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release

With the release of DeepSeek-V3 on December 25, 2024, the number of LLMjacking attacks in the cybersecurity space has significantly…

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access
10
Feb
2025

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access

Cisco has reportedly fallen victim to a significant data breach, with sensitive credentials from its internal network and domain infrastructure…

Seven Years old Linux Kernel Flaw Let Attackers Execute Remote Code
10
Feb
2025

Seven Years old Linux Kernel Flaw Let Attackers Execute Remote Code

Researchers have uncovered a critical flaw in the Linux kernel that could allow attackers to execute remote code.  The vulnerability,…

Ransomware Payments Dropped By 35%, As Victims Refusing To Pay
10
Feb
2025

Ransomware Payments Dropped By 35%, As Victims Refusing To Pay

In a significant shift in the ransomware landscape, payments to attackers have decreased by approximately 35% year-over-year. This decline is…

Penetration Testers Arrested by Police During Authorized Physical Penetration Testing
10
Feb
2025

Penetration Testers Arrested by Police During Authorized Physical Penetration Testing

A routine physical penetration test conducted by cybersecurity professionals took an unexpected turn when armed police arrested two security experts…

New 'BYOTB' Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal
10
Feb
2025

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

Security researcher David Kennedy unveiled a novel attack technique known as “BYOTB” (Bring Your Own Trusted Binary) in a recent…

World's Longest and Strongest WiFi Passwords From 31m Passwords List
10
Feb
2025

World’s Longest and Strongest WiFi Passwords From 31m Passwords List

A cybersecurity enthusiast discovered the longest and most complicated passwords ever used by searching through a huge dataset of 31…

SAML Bypass Authentication on GitHub Enterprise Servers To Login as Other User Account
10
Feb
2025

SAML Bypass Authentication on GitHub Enterprise Servers To Login as Other User Account

A significant vulnerability has been identified in GitHub Enterprise Servers, allowing attackers to bypass SAML authentication and log in as…

Tor Browser 14.0.6 Released, What’s New!
10
Feb
2025

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially launched Tor Browser 14.0.6, addressing a critical crash issue affecting users on older macOS systems….

Critical Zimbra Vulnerabilities Let Attackers Unauthorized Access to Internal Resources
10
Feb
2025

Critical Zimbra Vulnerabilities Let Attackers Unauthorized Access to Internal Resources

Zimbra Collaboration, a popular open-source email and collaboration software, was recently discovered to include critical vulnerabilities that pose serious risks…

Massive Brute Force Attack Targets VPN and Firewall Logins Using 2.8 Million IPs
10
Feb
2025

Massive Brute Force Attack Targets VPN and Firewall Logins Using 2.8 Million IPs

A global brute force attack campaign leveraging 2.8 million IP addresses actively targets edge security devices, including VPNs, firewalls, and…