Category: CyberSecurityNews

Multiple Oracle VM VirtualBox Vulnerabilities Enables Complete Takeover Of VirtualBox
23
Oct
2025

Multiple Oracle VM VirtualBox Vulnerabilities Enables Complete Takeover Of VirtualBox

Oracle has disclosed multiple critical vulnerabilities in its Oracle VM VirtualBox virtualization software, potentially allowing attackers to achieve complete control…

TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes
23
Oct
2025

TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes

A severe vulnerability in the async-tar Rust library and its popular forks, including the widely used tokio-tar. Dubbed TARmageddon and…

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks
23
Oct
2025

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

The Internet Systems Consortium (ISC) disclosed three high-severity vulnerabilities in BIND 9 on October 22, 2025, potentially allowing remote attackers…

Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
23
Oct
2025

Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset

Cloud account takeover attacks have evolved into a sophisticated threat as cybercriminals and state-sponsored actors increasingly weaponize OAuth applications to…

New PassiveNeuron Attacking Servers of High-Profile Organizations to Implant Malware
22
Oct
2025

New PassiveNeuron Attacking Servers of High-Profile Organizations to Implant Malware

A sophisticated cyberespionage campaign dubbed PassiveNeuron has resurfaced with infections targeting government, financial, and industrial organizations across Asia, Africa, and…

Here's How to Solve It 
22
Oct
2025

Here’s How to Solve It 

QR codes used to be harmless, now they’re one of the sneakiest ways attackers slip past defenses. Quishing, or QR code phishing, hides malicious…

Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
22
Oct
2025

Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

A critical vulnerability in Smithery.ai, a popular registry for Model Context Protocol (MCP) servers. This issue could have allowed attackers…

Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code
22
Oct
2025

Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code

A critical argument injection flaw in three unnamed popular AI agent platforms enables attackers to bypass human approval safeguards and…

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies
22
Oct
2025

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies

China-based threat actors have exploited the critical ToolShell vulnerability in Microsoft SharePoint servers to infiltrate networks across multiple continents, targeting…

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique
22
Oct
2025

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique

When users authenticate to Microsoft cloud services, their activities generate authentication events recorded across multiple logging systems. Microsoft Entra sign-in…

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials
22
Oct
2025

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials

A sophisticated phishing kit dubbed Tykit, which impersonates Microsoft 365 login pages to harvest corporate credentials. First detected in May…

Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts
22
Oct
2025

Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts

Since its emergence in August 2022, Lumma Infostealer has rapidly become a cornerstone of malware-as-a-service platforms, enabling even unskilled threat…