In a significant cyber operation, Ukrainian hacktivist groups BO Team (Black Owl) and the Ukrainian Cyber Alliance, in collaboration with Ukraine’s military intelligence agency, have […]
Day: July 18, 2025
Critical Vulnerability in Microsoft Entra ID Enables Privilege Escalation to Global Administrator Role
A significant security vulnerability has been identified in Microsoft Entra ID, formerly known as Azure Active Directory, which allows attackers to escalate their privileges to […]
Critical BIND 9 Vulnerabilities Expose DNS Infrastructure to Cache Poisoning and Denial-of-Service Attacks
The Internet Systems Consortium (ISC) has identified and addressed two significant vulnerabilities in the BIND 9 Domain Name System (DNS) software, designated as CVE-2025-40776 and […]
Hackers Exploit ClickFix Techniques to Deploy NetSupport RAT, Latrodectus, and Lumma Stealer Malware
In the evolving landscape of cyber threats, a deceptive social engineering tactic known as ClickFix has emerged as a significant concern. First identified in late […]
WAFFLED: A New Attack Technique Bypassing Major Web Application Firewalls
In the ever-evolving landscape of cybersecurity, a novel attack method named WAFFLED has emerged, capable of circumventing leading Web Application Firewalls (WAFs) by exploiting subtle […]
Critical Vulnerability in TeleMessage’s Signal Clone Exposes Sensitive Data
A significant security flaw has been identified in TeleMessage’s TM SGNL, an enterprise messaging system modeled after Signal, which has been actively exploited by cybercriminals […]
CISA Issues Critical Advisories on Industrial Control Systems Vulnerabilities
On July 17, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released three significant advisories addressing critical vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities, […]
Microsoft Unveils Scattered Spider’s Evolving Cyberattack Tactics
In mid-2025, a surge of targeted cyber intrusions attributed to the threat group known as Scattered Spider—also referred to as Octo Tempest, UNC3944, Muddled Libra, […]
Massive Exploitation of CitrixBleed 2 Vulnerability Compromises Over 100 Organizations
A critical security flaw, known as CitrixBleed 2 (CVE-2025-5777), has been actively exploited by cyber attackers, leading to over 11.5 million attack attempts and compromising […]
Critical macOS Vulnerability Daemon Ex Plist Grants Attackers Root Access
A significant security flaw, termed Daemon Ex Plist, has been identified in macOS, enabling attackers to escalate their privileges to root access by exploiting misconfigured […]