Over the past decade, a sophisticated cyber threat actor known as TA-ShadowCricket has been conducting covert espionage operations against government and enterprise networks across the […]
Day: May 26, 2025
Critical WSO2 SOAP Vulnerability Enables Unauthorized Password Resets
A critical security vulnerability, identified as CVE-2024-6914, has been discovered in multiple WSO2 products, allowing attackers to reset passwords for any user account, including those […]
Cybercriminals Exploit Legitimate Database Client Tools for Stealthy Data Exfiltration
In a concerning development, cybersecurity experts have identified a sophisticated tactic employed by threat actors: the use of legitimate database client tools to exfiltrate sensitive […]
Malicious Chrome Extensions Masquerade as Popular Brands to Steal Sensitive Data
Cybersecurity researchers have uncovered a sophisticated campaign involving over 40 malicious Chrome browser extensions that impersonate trusted brands to steal sensitive user data. These extensions, […]
Critical Vulnerability in Oracle TNS Protocol Exposes Sensitive System Memory
A significant security flaw has been identified in Oracle’s Transparent Network Substrate (TNS) protocol, potentially allowing unauthenticated attackers to access sensitive system memory contents, including […]
Critical Apache Tomcat Vulnerability (CVE-2025-24813) Exploited for Remote Code Execution
A critical security flaw identified as CVE-2025-24813 has been discovered in Apache Tomcat, a widely used open-source Java servlet container. This vulnerability allows unauthenticated attackers […]
Critical XSS Vulnerability in Bitwarden’s PDF File Handler Exposes Users to Malicious Attacks
A significant cross-site scripting (XSS) vulnerability has been identified in Bitwarden, a widely used password management service. This flaw, cataloged as CVE-2025-5138, affects versions up […]
Malicious npm Packages Compromise Developer Environments by Exfiltrating Sensitive Network Data
A sophisticated malware campaign has infiltrated the npm ecosystem, compromising developer environments through 60 malicious packages designed to silently harvest sensitive network information. This operation, […]
The Emergence of Street-Level QR Code Phishing: A New Frontier in Cybercrime
In a recent development that underscores the evolving nature of cyber threats, security experts have identified a novel form of phishing attack that merges digital […]
Katz Stealer: A Sophisticated Threat Targeting Major Web Browsers
In the ever-evolving landscape of cyber threats, a new and sophisticated malware known as Katz Stealer has emerged, posing significant risks to users of popular […]