Category: CyberSecurityNews

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
20
Mar
2025

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers

A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files. The…

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges
20
Mar
2025

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges

A severe vulnerability in the Linux kernel has remained undetected for nearly two decades, allowing local users to gain root…

Attackers Embedding Malicious Word file into a PDF to Evade Detections
20
Mar
2025

Attackers Embedding Malicious Word file into a PDF to Evade Detections

A sophisticated attack vector dubbed “MalDoc in PDF” allows threat actors to bypass traditional security scanning by embedding malicious Word…

41% of Success Logins Across Websites Involves Compromised Passwords
20
Mar
2025

41% of Success Logins Across Websites Involves Compromised Passwords

Password reuse continues to be one of the most significant security vulnerabilities in 2025, with alarming new data showing nearly…

vUS Sperm Donor Giant California Cryobank Hacked
20
Mar
2025

vUS Sperm Donor Giant California Cryobank Hacked

California Cryobank LLC, one of America’s largest sperm donor repositories, has confirmed a significant data breach that exposed sensitive customer…

Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation
20
Mar
2025

Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation

A sophisticated attack employing Legacy Driver Exploitation technique has emerged as a significant cybersecurity threat, according to a recent security…

ANY.RUN Now Let SOC/DFIR Team Analse Android APK Malware With Sandbox
20
Mar
2025

ANY.RUN Now Let SOC/DFIR Team Analse Android APK Malware With Sandbox

ANY.RUN, the interactive malware analysis platform has announced full support for Android OS in its cloud-based sandbox environment, enabling security…

Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks
20
Mar
2025

Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks

Cybersecurity experts have identified a persistent trend of threat actors exploiting legitimate remote monitoring and management (RMM) software to infiltrate…

A Revolutionary CNAPP For Preventive Cybersecurity
20
Mar
2025

A Revolutionary CNAPP For Preventive Cybersecurity

Moving Beyond Detection to Real-Time, Automated Security Across Workloads, Cloud, and Infrastructure  SecPod, a global cybersecurity provider, has announced the…

Kali Linux 2025.1a New Tool & Upates to Desktop Environments
20
Mar
2025

Kali Linux 2025.1a New Tool & Upates to Desktop Environments

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has officially unveiled its latest release, Kali Linux 2025.1a. This update not only significantly enhances desktop environments but also…

MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox
19
Mar
2025

MirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows Sandbox

The China-aligned advanced persistent threat (APT) group MirrorFace has updated its tactics, techniques, and procedures (TTPs) with a sophisticated approach…

VPN Vulnerabilities Emerges As The Key Tool for Threat Actors to Attack Organizations
19
Mar
2025

VPN Vulnerabilities Emerges As The Key Tool for Threat Actors to Attack Organizations

VPN infrastructure has become a prime target for cybercriminals and state-sponsored actors, with vulnerabilities in these systems serving as gateways…