Category: CyberSecurityNews

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution
05
Aug
2025

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution

A sophisticated method to bypass Web Application Firewall (WAF) protections using HTTP Parameter Pollution techniques combined with JavaScript injection.  The…

Fashion Giant Chanel Hacked in Wave of Salesforce Attacks
05
Aug
2025

Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

French luxury fashion house Chanel has become the latest victim in a sophisticated cybercrime campaign targeting major corporations through their…

Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction
05
Aug
2025

Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction

Google released its August 2025 Android Security Bulletin on August 4, revealing a critical vulnerability that poses significant risks to…

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
05
Aug
2025

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

A sophisticated new Android malware campaign has emerged targeting Indian banking customers through convincing impersonations of popular financial applications. The…

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
05
Aug
2025

NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control

A critical vulnerability chain in NVIDIA’s Triton Inference Server that allows unauthenticated attackers to achieve complete remote code execution (RCE)…

Raspberry Robin Malware Downloader Attacking Windows Systems With New Exploit for Common Log File System Driver Vulnerability
05
Aug
2025

Raspberry Robin Malware Downloader Attacking Windows Systems With New Exploit for Common Log File System Driver Vulnerability

The cybersecurity landscape faces a persistent threat as Raspberry Robin, a sophisticated malware downloader also known as Roshtyak, continues its…

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware
04
Aug
2025

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware

A sophisticated new attack method that exploits AI models’ tendency to comply with legal-sounding text, successfully bypassing safety measures in…

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
04
Aug
2025

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware

A likely zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) VPNs and firewall appliances is being actively exploited in the…

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
04
Aug
2025

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help

Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude…

Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
04
Aug
2025

Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

The sudden emergence of the Royal ransomware in early 2023 marked a significant escalation in cyber threats targeting service providers…

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
04
Aug
2025

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents

The cybersecurity landscape has witnessed an unprecedented evolution as threat actors increasingly weaponize artificial intelligence to amplify their attack capabilities…

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
04
Aug
2025

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

A sophisticated new cybercriminal campaign has emerged, leveraging a Python-based information stealer known as PXA Stealer to orchestrate one of…