Category: CyberSecurityNews

Exposed 'Kim' Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure
08
Sep
2025

Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure

A massive data breach in early September 2025 attributed to a cyber actor known simply as “Kim” laid bare an…

Venezuela's Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies
08
Sep
2025

Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies

In Caracas this week, President Nicolás Maduro unveiled the Huawei Mate X6 gifted by China’s Xi Jinping, declaring the device…

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data
08
Sep
2025

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

Security researchers first observed LunaLock in early September 2025, a sophisticated ransomware strain targeting independent illustrators and digital artists. Leveraging…

Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day
08
Sep
2025

Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day

A sophisticated cybercriminal campaign has emerged, exploiting Amazon’s Simple Email Service (SES) to orchestrate large-scale phishing operations capable of delivering…

08
Sep
2025

Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day

A sophisticated cybercriminal campaign has emerged, exploiting Amazon’s Simple Email Service (SES) to orchestrate large-scale phishing operations capable of delivering…

Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution
08
Sep
2025

Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution

Cybersecurity researchers have demonstrated a sophisticated technique for bypassing Web Application Firewalls (WAFs) using JavaScript injection combined with HTTP parameter…

PoC Exploit Released for ImageMagick RCE Vulnerability
08
Sep
2025

PoC Exploit Released for ImageMagick RCE Vulnerability

A proof-of-concept (PoC) exploit has been released for a critical remote code execution (RCE) vulnerability in ImageMagick 7’s MagickCore subsystem, specifically affecting…

Atomic Stealer Disguised as Cracked Software Attacking macOS Users
08
Sep
2025

Atomic Stealer Disguised as Cracked Software Attacking macOS Users

A sophisticated malware campaign targeting macOS users has emerged, exploiting the widespread desire for free software to deliver the notorious…

Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft
08
Sep
2025

Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft

A sophisticated supply-chain attack that impacted over 700 organizations, including major cybersecurity firms, has been traced back to a compromise…

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea
08
Sep
2025

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea

Microsoft’s Azure cloud platform is facing significant disruptions after multiple undersea fiber optic cables were severed in the Red Sea….

Apache Jackrabbit Exposes Systems To Arbitrary Code Execution Attacks
08
Sep
2025

Apache Jackrabbit Exposes Systems To Arbitrary Code Execution Attacks

An important security vulnerability has been discovered in Apache Jackrabbit, a popular open-source content repository used in enterprise content management…

How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach
08
Sep
2025

How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach

After a security breach, forensic investigators work quickly to follow the attacker’s trail. Security experts have analyzed this situation and…