Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
16
Aug
2025

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code

A critical vulnerability in the Microsoft Web Deploy tool could allow authenticated attackers to execute remote code on affected systems. …

Winning the Breach Intelligence Race: How CISOs Can Stay Ahead of Threats Using Public Data
16
Aug
2025

Winning the Breach Intelligence Race: How CISOs Can Stay Ahead of Threats Using Public Data

Introduction In today’s fast-evolving threat landscape, traditional breach detection systems often fall short in providing early warnings. CISOs are under…

New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials
16
Aug
2025

New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials

A sophisticated new phishing campaign targeting Gmail users through a multi-layered attack that uses legitimate Microsoft Dynamics infrastructure to bypass…

"Serial Hacker" Sentenced to 20 Months in UK Prison
16
Aug
2025

“Serial Hacker” Sentenced to 20 Months in UK Prison

Rotherham hacker Al-Tahery Al-Mashriky jailed for 20 months after global cyberattacks, stealing millions of logins and targeting government websites. When…

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
16
Aug
2025

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

Security researchers have uncovered four serious vulnerabilities in ImageMagick, one of the world’s most widely used open-source image processing software…

Why Certification is Critical for Securing the Future of eSIM and IoT Connectivity
16
Aug
2025

Why Certification is Critical for Securing the Future of eSIM and IoT Connectivity

The Internet of Things (IoT) has evolved from a visionary concept into a global reality. With over 38 billion connected…

Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access
16
Aug
2025

Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access

A sophisticated social engineering campaign by the EncryptHub threat group that combines impersonation tactics with technical exploitation to compromise corporate…

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages
16
Aug
2025

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages

A sophisticated phishing campaign targeting the maintainer of eslint-config-prettier, a widely-used npm package with over 3.5 billion downloads, resulted in…

Scammers Compromised by Own Malware, Expose $4.67M Operation
16
Aug
2025

Scammers Compromised by Own Malware, Expose $4.67M Operation

CloudSEK uncovered a Pakistan-based family cybercrime network that spread infostealers via pirated software, netting $4.67M and millions of victims. The…

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
16
Aug
2025

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure

Aug 16, 2025Ravie LakshmananAndroid / Malware Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC…

Russia Is Cracking Down on End-to-End Encrypted Calls
16
Aug
2025

Russia Is Cracking Down on End-to-End Encrypted Calls

WIRED copublished an investigation this week with The Markup and CalMatters showing that dozens of data brokers have been hiding…

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks
16
Aug
2025

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Cisco Talos researchers have uncovered a sophisticated Chinese-speaking advanced persistent threat (APT) group, designated UAT-7237, that has been actively targeting…