Zimbra Classic Web Client Vulnerability Let Attackers Execute Arbitrary JavaScript
24
Jun
2025

Zimbra Classic Web Client Vulnerability Let Attackers Execute Arbitrary JavaScript

A critical security vulnerability has been discovered in Zimbra Classic Web Client that enables attackers to execute arbitrary JavaScript code…

EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access
24
Jun
2025

EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access

A notorious threat actor known as “xperttechy” is actively promoting a new version of the EagleSpy remote access Trojan (RAT),…

Androxgh0st Botnet Expands Reach, Exploiting US University Servers
24
Jun
2025

Androxgh0st Botnet Expands Reach, Exploiting US University Servers

New CloudSEK findings show Androxgh0st botnet evolving. Academic institutions, including UC San Diego, hit. Discover how this sophisticated threat uses…

Mr Hamza claims U.S. DDoS attacks
24
Jun
2025

U.S. DDoS Attacks Launched By Pro-Iran Hacktivists

Iran-aligned hacktivists launched DDoS attacks against 15 U.S. organizations and 19 websites in the first 24 hours after the U.S….

Windows
24
Jun
2025

Microsoft fixes known issue that breaks Windows 11 updates

Microsoft is rolling out a configuration update designed to address a known issue causing Windows Update to fail on some…

New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
24
Jun
2025

New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands

A novel social engineering technique called “FileFix” that exploits Windows File Explorer’s address bar functionality to execute malicious commands, presenting…

America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
24
Jun
2025

America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers

Jérôme Segura, cybercriminals are exploiting search parameter vulnerabilities to inject fake phone numbers into the legitimate websites of major brands…

Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
24
Jun
2025

Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange

In a significant escalation of cyber warfare in the Middle East, suspected Israeli state-sponsored threat actors operating under the name…

New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities
24
Jun
2025

New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities

A new variant of the DRAT remote access trojan (RAT), dubbed DRAT V2, has been uncovered as part of a…

Kali Linux 2025.1c Fixes Key Issue, Adds New Tools and Interface Updates
24
Jun
2025

Kali Linux 2025.1c Fixes Key Issue, Adds New Tools and Interface Updates

Kali Linux users face update errors due to a lost signing key in April 2025. Learn how to identify if…

Federal officials, critical infrastructure leaders remain on guard for Iran-linked hacks
24
Jun
2025

Federal officials, critical infrastructure leaders remain on guard for Iran-linked hacks

Federal officials and private-sector security leaders said Tuesday that they are closely monitoring for cyberattacks related to the Iran conflict…

Sprocket data header
24
Jun
2025

How Today’s Pentest Models Compare and Why Continuous Wins

As threat actors grow faster, stealthier, and more persistent, the approach to pentesting needs to keep evolving. Traditional, periodic assessments…