Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows
07
Jul
2025

Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows

Cybercriminals are increasingly exploiting legitimate Windows driver signing processes to deploy sophisticated kernel-level malware, with new research revealing a concerning…

Microsoft to Remove PowerShell 2.0 from Windows 11 Due to Security Risks
07
Jul
2025

Microsoft to Remove PowerShell 2.0 from Windows 11 Due to Security Risks

Microsoft has announced a significant change for Windows 11 users: the removal of Windows PowerShell 2.0, a legacy scripting platform,…

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users
07
Jul
2025

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users

Security researchers from the Socket Threat Research Team have uncovered a sophisticated network of eight malicious Firefox browser extensions that…

ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access
07
Jul
2025

ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access

Two critical vulnerabilities in ScriptCase’s Production Environment module can be chained together to achieve pre-authenticated remote command execution on affected…

CitrixBleed 2 Vulnerability PoC Published
07
Jul
2025

CitrixBleed 2 Vulnerability PoC Published

A newly published proof-of-concept (PoC) for the critical CitrixBleed 2 vulnerability (CVE-2025-5777) has sent shockwaves through the cybersecurity community, with…

NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
07
Jul
2025

NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware

A sophisticated APT group dubbed “NightEagle” (APT-Q-95) has been conducting targeted attacks against China’s critical technology sectors since 2023.  The…

Linux Boot Vulnerability Lets Attackers Bypass Secure Boot Protections
07
Jul
2025

Linux Boot Vulnerability Lets Attackers Bypass Secure Boot Protections

A newly highlighted vulnerability in the Linux boot process exposes a critical weakness in the security posture of many modern…

Malware Surge Hits Android: Adware, Trojans and Crypto Theft Lead Q2 Threats
07
Jul
2025

Adware, Trojans and Crypto Theft Lead Q2 Threats

A series of malicious apps and stealthy spyware is targeting Android users worldwide, with new data showing how cybercriminals keep…

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
07
Jul
2025

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini July 07, 2025 U.S. Cybersecurity…

New Linux EDR Evasion Tool Exploits io_uring Kernel Feature
07
Jul
2025

New Linux EDR Evasion Tool Exploits io_uring Kernel Feature

A new tool named RingReaper is raising eyebrows among defenders and red teamers alike. By leveraging the legitimate, high-performance Linux…

New technique detects tampering or forgery of a PDF document
07
Jul
2025

New technique detects tampering or forgery of a PDF document

Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s…

week in security
07
Jul
2025

A week in security (June 30 – July 6)

July 3, 2025 – The “El Chapo” Mexican drug cartel snooped on FBI personnel through hacked cameras, and listened in…