Category: CyberSecurityNews

Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT
19
Sep
2025

Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT

The emergence of a new campaign weaponizing legitimate remote monitoring and management software has alarmed security teams worldwide. Attackers are…

ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses
19
Sep
2025

ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses

ChatGPT agents can be manipulated into bypassing their own safety protocols to solve CAPTCHA, raising significant concerns about the robustness…

SystemBC Botnet Hacked 1,500 VPS Servers Daily to Hire for DDoS Attack
19
Sep
2025

SystemBC Botnet Hacked 1,500 VPS Servers Daily to Hire for DDoS Attack

The emergence of the SystemBC botnet marks a significant evolution in proxy-based criminal infrastructure. Rather than co-opt residential devices for…

RDP vs SSH Comparison - Features, Protocols, Security, And Use Cases
19
Sep
2025

RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases

Remote Desktop Protocol (RDP) and Secure Shell (SSH) have changed how organizations manage their IT systems. These tools allow employees…

HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks
19
Sep
2025

HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks

A newly disclosed flaw in HubSpot’s open-source Jinjava template engine could allow attackers to bypass sandbox restrictions and achieve remote…

Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation
19
Sep
2025

Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation

A deserialization flaw in the License Servlet component of Fortra GoAnywhere Managed File Transfer (MFT) platform. Identified as CVE-2025-10035, this…

New Malware Loader 'CountLoader' Weaponized PDF File to Deliver Ransomware
19
Sep
2025

New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware

In recent months, security teams have observed the emergence of a sophisticated malware loader, dubbed CountLoader, which leverages weaponized PDF…

Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August
19
Sep
2025

Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August

The ransomware threat landscape witnessed a dramatic shift in August 2025 as the Qilin group claimed responsibility for 104 separate…

Global Spyware Markets to Identify New Entities Entering The Market
19
Sep
2025

Global Spyware Markets to Identify New Entities Entering The Market

The global spyware market continues its alarming expansion, with new research revealing the emergence of 130 additional entities spanning 46…

New Phishing Attack Targets Facebook Users to Steal Login Credentials
19
Sep
2025

New Phishing Attack Targets Facebook Users to Steal Login Credentials

A sophisticated phishing campaign has recently emerged, targeting Facebook users with carefully crafted emails designed to harvest login credentials. Attackers…

Splunk Releases Guide to Detect Remote Employment Fraud Within Your Organization
19
Sep
2025

Splunk Releases Guide to Detect Remote Employment Fraud Within Your Organization

Detecting remote employment fraud has become a critical priority for organizations striving to secure their digital onboarding processes and safeguard…

New iOS Video Injection Tool Bypasses Biometric Verification with Jailbroken iPhones
19
Sep
2025

New iOS Video Injection Tool Bypasses Biometric Verification with Jailbroken iPhones

A sophisticated new attack tool targeting jailbroken iOS devices has emerged, representing a significant escalation in digital identity fraud capabilities. …