TP-Link Vulnerabilities Under Active Exploitation
05
Sep
2025

TP-Link Vulnerabilities Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding critical vulnerabilities in popular TP-Link router models…

SVG files used in hidden malware campaign impersonating Colombian authorities
05
Sep
2025

SVG files used in hidden malware campaign impersonating Colombian authorities

SVG files used in hidden malware campaign impersonating Colombian authorities Pierluigi Paganini September 05, 2025 VirusTotal uncovered an undetected malware…

05
Sep
2025

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

A critical, zero-click vulnerability that allows attackers to hijack online accounts by exploiting how web applications handle international email addresses….

Colombian Malware Exploits SWF and SVG to Evade Detection
05
Sep
2025

Colombian Malware Exploits SWF and SVG to Evade Detection

A sophisticated malware campaign targeting Colombian institutions through an unexpected vector: weaponized SWF and SVG files that successfully evade traditional…

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework
05
Sep
2025

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Cybersecurity researchers have identified a sophisticated new command-and-control framework that exploits legitimate Google Calendar APIs to establish covert communication channels…

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto
05
Sep
2025

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto

A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency…

New NightshadeC2 Botnet Uses 'UAC Prompt Bombing' to Bypass Windows Defender Protections
05
Sep
2025

New NightshadeC2 Botnet Uses ‘UAC Prompt Bombing’ to Bypass Windows Defender Protections

Security teams began observing a novel botnet strain slipping beneath the radar of standard Windows Defender defenses in early August…

North Korean Hackers Expose Their Playbook for Swapping Infrastructure
05
Sep
2025

North Korean Hackers Expose Their Playbook for Swapping Infrastructure

A sophisticated North Korean cyber operation has been exposed, revealing how state-sponsored hackers systematically monitor cybersecurity intelligence platforms to detect…

Automation Is Redefining Pentest Delivery
05
Sep
2025

Automation Is Redefining Pentest Delivery

Sep 05, 2025The Hacker NewsPentesting / Security Operations Pentesting remains one of the most effective ways to identify real-world security…

Chinese Data Transfer, Czechia, Czechia Warning, China, Remote Administration, Critical Infrastructure
05
Sep
2025

Czechia Warns Of Chinese Data Transfers And Remote Administration For Espionage

Czechia’s national cybersecurity watchdog has issued a warning about foreign cyber operations, focussed on Chinese data transfers and remote administration,…

Hackers May Leverage Raw Disk Reads to Bypass EDR Solutions and Access Highly Sensitive Files
05
Sep
2025

Hackers May Leverage Raw Disk Reads to Bypass EDR Solutions and Access Highly Sensitive Files

A new technique that allows attackers to read highly sensitive files on Windows systems, bypassing many of the modern security…

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework
05
Sep
2025

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework

A novel serverless command-and-control (C2) technique that abuses Google Calendar APIs to obscure malicious traffic inside trusted cloud services. Dubbed…