Recent findings have unveiled significant security vulnerabilities within Amazon Elastic Kubernetes Service (EKS), allowing overprivileged containers to access sensitive AWS credentials through packet sniffing and […]
Day: June 23, 2025
North Korean Hackers Exploit Zoom to Target Cryptocurrency Firms
In recent developments, cybersecurity experts have identified a sophisticated campaign by the North Korean state-sponsored hacking group, Bluenoroff, targeting cryptocurrency firms through the exploitation of […]
Microsoft Addresses ‘aCropalypse’ Vulnerability in Windows Snipping Tools
In March 2023, a significant security vulnerability, dubbed aCropalypse, was identified in Windows 10 and 11’s screenshot editing tools—Snip & Sketch and Snipping Tool, respectively. […]
SparkKitty Malware Targets iOS and Android Devices via Official App Stores
In a significant escalation of mobile cybersecurity threats, researchers have identified a new malware campaign named SparkKitty that has successfully infiltrated both Apple’s App Store […]
CoinMarketCap Doodle Image Vulnerability Exposes Users to Malicious Code via API Calls
On June 20, 2025, CoinMarketCap, a prominent cryptocurrency data aggregator, identified a security vulnerability involving a decorative doodle image on its homepage. This image contained […]
Critical Vulnerability in Meshtastic Firmware Compromises Private Communications
A significant security flaw has been identified in the Meshtastic firmware, potentially allowing unauthorized access to private messages transmitted between devices. This vulnerability, assigned a […]
Confucius Hacker Group Deploys Advanced Modular Malware Targeting Government and Military Entities
The Confucius hacking group, active since 2013 and formally identified in 2016, has significantly advanced its cyber capabilities by introducing a sophisticated modular malware system […]
Shadow Vector Malware Exploits SVG Files to Deploy Remote Access Trojans
A sophisticated cyberattack campaign, known as Shadow Vector, is actively targeting users in Colombia by leveraging malicious Scalable Vector Graphics (SVG) files to deploy remote […]
North Korean Hackers Exploit GitHub Infrastructure to Distribute Malware
In a recent development, cybersecurity researchers have uncovered a sophisticated cyber espionage campaign orchestrated by North Korean state-sponsored actors. This operation leverages GitHub’s infrastructure to […]
Escalating DDoS Attacks Threaten Financial Sector Stability
In recent years, Distributed Denial of Service (DDoS) attacks have evolved from minor disruptions to significant threats capable of incapacitating financial institutions for extended periods. […]