Category: CyberSecurityNews

Critical Microsoft's Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
18
Sep
2025

Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control

A critical vulnerability in Microsoft’s Entra ID could have allowed an attacker to gain complete administrative control over any tenant…

New ‘shinysp1d3r’ Ransomware-as-a-service in Active Development to Encrypt VMware ESXi Environments
18
Sep
2025

New ‘shinysp1d3r’ Ransomware-as-a-service in Active Development to Encrypt VMware ESXi Environments

Emerging in mid-2025, the shinysp1d3r ransomware-as-a-service (RaaS) platform represents the next evolution of cloud-focused extortion tools. Unlike traditional ransomware that…

PureVPN Vulnerability Exposes Users IPv6 Address While Toggling Wi-Fi
18
Sep
2025

PureVPN Vulnerability Exposes Users IPv6 Address While Toggling Wi-Fi

PureVPN’s Linux clients leak users’ IPv6 addresses when Wi-Fi reconnections or system resumes occur, and also obliterate host firewall rules…

SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed
18
Sep
2025

SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed

SonicWall has issued an urgent advisory urging all customers to perform an Essential Credential Reset after security researchers discovered that…

Jenkins Patches Multiple Vulnerabilities that Allow Attackers to Cause a Denial of Service
18
Sep
2025

Jenkins Patches Multiple Vulnerabilities that Allow Attackers to Cause a Denial of Service

Jenkins has released critical updates addressing four security flaws that unauthenticated and low-privileged attackers could exploit to disrupt service or…

Researchers Uncover Hidden Connections Between Ransomware Groups and Relationships Between Them
18
Sep
2025

Researchers Uncover Hidden Connections Between Ransomware Groups and Relationships Between Them

In recent months, cybersecurity researchers have exposed a tangled web of hidden alliances among leading ransomware operations, reshaping how defenders…

Beware of Typosquatted Malicious PyPI Packages That Delivers SilentSync RAT
18
Sep
2025

Beware of Typosquatted Malicious PyPI Packages That Delivers SilentSync RAT

Python developers face a growing threat from typosquatted packages in the Python Package Index (PyPI), with malicious actors increasingly targeting…

Raven Stealer Attacking Google Chrome Users to Steal Sensitive Data
18
Sep
2025

Raven Stealer Attacking Google Chrome Users to Steal Sensitive Data

Raven Stealer has emerged as a potent information‐stealing threat targeting users of Chromium‐based browsers, most notably Google Chrome. First observed…

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections
18
Sep
2025

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2025-9961, has been discovered in TP-Link routers. Security research firm…

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network
18
Sep
2025

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network

The newly publicized Pixie Dust attack has once again exposed the critical vulnerabilities inherent in the Wi-Fi Protected Setup (WPS)…

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild
18
Sep
2025

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild

Google has released an emergency security update for its Chrome web browser to address a high-severity zero-day vulnerability that is…

China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications
18
Sep
2025

China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications

The Chinese state-sponsored threat actor TA415 has evolved its tactics, techniques, and procedures by leveraging legitimate cloud services like Google…