Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls
23
Jun
2025

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls

Summary 1. CVE-2025-49825 allows attackers to remotely bypass Teleport’s authentication controls, affecting multiple versions of the secure access platform. 2. Teleport…

UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems
23
Jun
2025

UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems

The national team for responding to cyber incidents, CERT-UA, has exposed a sophisticated cyberattack targeting the information and communication system…

1inch rolls out expanded bug bounties with rewards up to $500K
23
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts, wallet and infrastructure. A community-first approach to…

APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign
23
Jun
2025

APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign

APT36, also known as Transparent Tribe, a Pakistan-based cyber espionage group, has launched a highly sophisticated phishing campaign targeting Indian…

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References
23
Jun
2025

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References

Summary 1. Harmful Objective Concealed: Attacker defines a harmful goal but starts with benign prompts. 2. Context Poisoning: Introduces subtle…

Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads
23
Jun
2025

Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads

Acronis Threat Research Unit (TRU) has discovered a startling development: a malicious campaign called “Shadow Vector” is actively targeting Colombian…

1inch rolls out expanded bug bounties with rewards up to $500K
23
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

DUBAI, United Arab Emirates, June 23rd, 2025, CyberNewsWire Five dedicated bug bounty programs upgraded across 1inch core components, including smart…

Hacker starting at a smartphone
23
Jun
2025

Malware on Google Play, Apple App Store stole your photos—and crypto

A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting…

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
23
Jun
2025

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague

The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL Conference 2025, taking place October 7–9, 2025, at the Vienna…

Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis
23
Jun
2025

Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis

Microsoft has announced a significant upgrade to its Defender for Office 365 platform, introducing a new AI-powered capability designed to…

McLaren Health Care Data Breach Exposes 743,000 People Personal Information
23
Jun
2025

McLaren Health Care Data Breach Exposes 743,000 People Personal Information

McLaren Health Care, a major healthcare organization based in Grand Blanc, Michigan, has disclosed a significant data breach that compromised…

NCSC Issues Alert on 'UMBRELLA STAND' Malware Targeting Fortinet FortiGate Firewalls
23
Jun
2025

NCSC Issues Alert on ‘UMBRELLA STAND’ Malware Targeting Fortinet FortiGate Firewalls

The National Cyber Security Centre (NCSC) has sounded the alarm over a newly identified malware dubbed “UMBRELLA STAND,” specifically targeting…