Category: CyberSecurityNews

OpenSSF Released Security Baseline for Linux Projects
27
Feb
2025

OpenSSF Released Security Baseline for Linux Projects

The Open Source Security Foundation (OpenSSF) has launched the Open Source Project Security Baseline (OSPS Baseline), a tiered framework designed…

Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands
27
Feb
2025

Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands

Cisco Systems has issued a critical security advisory addressing a command injection vulnerability in its Nexus 3000 and 9000 Series…

New Attack “nRootTag” Turns 1.5 Billion iPhones as Free Tracking Agents
27
Feb
2025

New Attack “nRootTag” Turns 1.5 Billion iPhones as Free Tracking Agents

A new attack dubbed nRootTag has exposed over 1.5 billion Apple devices, including iPhones, iPads, Apple Watches, and Macs, to…

CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild
26
Feb
2025

CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent advisory on February 25, 2025, confirming that threat actors…

GitVenom Campaign Abusing Thousands of GitHub Repositories To Infect Users
25
Feb
2025

GitVenom Campaign Abusing Thousands of GitHub Repositories To Infect Users

A sophisticated malware campaign dubbed “GitVenom” has exploited GitHub’s open-source ecosystem to distribute malicious code through thousands of fraudulent repositories,…

Sliver C2 Server Vulnerability Let Attackers Open a TCP connection to Read Traffic
25
Feb
2025

Sliver C2 Server Vulnerability Let Attackers Open a TCP connection to Read Traffic

A critical server-side request forgery (SSRF) vulnerability (CVE-2025-27090) has been identified in the Sliver C2 framework’s teamserver implementation, enabling attackers…

UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure
25
Feb
2025

UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure

A sophisticated threat cluster tracked as UAC-0212 has escalated efforts to compromise critical infrastructure systems in Ukraine, according to a…

LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users
25
Feb
2025

LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users

The LightSpy advanced persistent threat (APT) group has significantly upgraded its surveillance capabilities with a 100+ command framework targeting Android,…

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site
25
Feb
2025

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site

Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website.  This…

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings
25
Feb
2025

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings

INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small…

200 Malicious GitHub Repos Attacking Developers to Deliver Malware
25
Feb
2025

200 Malicious GitHub Repos Attacking Developers to Deliver Malware

In an era where open-source collaboration drives software innovation, a sophisticated cyber campaign dubbed GitVenom has emerged as a critical…

16 Malicious Chrome Extensions Infected Over 3.2 Million Users
25
Feb
2025

16 Malicious Chrome Extensions Infected Over 3.2 Million Users

A coordinated campaign involving at least 16 malicious Chrome extensions infected over 3.2 million users worldwide, leveraging browser security vulnerabilities…