Unprecedented 29.7 Tbps DDoS Attack Linked to AISURU Botnet In a significant escalation of cyber threats, Cloudflare has successfully mitigated the largest distributed denial-of-service (DDoS) […]
Year: 2025
Cybersecurity Roundup: Yearn Finance Exploit, Linux Malware Advances, npm Threats, Wi-Fi Vulnerabilities Highlight Risks
Cybersecurity Roundup: Wi-Fi Vulnerabilities, npm Worms, DeFi Exploits, and More In the ever-evolving landscape of cybersecurity, recent developments have highlighted significant vulnerabilities and attacks across […]
Silver Fox Targets Chinese Firms with Fake Microsoft Teams Installers to Spread ValleyRAT Malware
Silver Fox’s Deceptive Tactics: Fake Microsoft Teams Installers Deploy ValleyRAT Malware in China In a sophisticated cyber-espionage campaign, the threat actor known as Silver Fox […]
Critical Command Injection Flaw Exploited in Array Networks AG Series; Update to ArrayOS 9.4.5.9 Urged
Critical Command Injection Vulnerability Exploited in Array Networks AG Series A significant security flaw has been identified in Array Networks’ AG Series secure access gateways, […]
Chinese Hackers Use BRICKSTORM Backdoor to Infiltrate US Systems, Warns CISA
Chinese State-Sponsored Hackers Exploit BRICKSTORM Backdoor to Infiltrate U.S. Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently unveiled details about a sophisticated […]
Hackers Exploit Velociraptor Tool for Stealthy Ransomware Command and Control Channels
Hackers Exploit Velociraptor DFIR Tool for Stealthy Command and Control in Ransomware Attacks In a concerning development, cybercriminals are repurposing legitimate security tools to orchestrate […]
Sryxen Malware Bypasses Chrome Encryption, Steals Sensitive Data via Innovative Browser Exploit
Sryxen Stealer: The New Malware Bypassing Chrome’s App-Bound Encryption A new malware named Sryxen has surfaced, posing a significant threat to Windows users by targeting […]
Evilginx Phishing Toolkit Bypasses MFA, Hijacks User Sessions in Rising Cyber Threat
Hackers Exploit Evilginx to Bypass Multi-Factor Authentication and Hijack User Sessions In the ever-evolving landscape of cyber threats, a sophisticated phishing toolkit known as Evilginx […]
iOS Zero-Day Exploit Chain Used by Spyware for Covert Surveillance in Egypt
Mercenary Spyware Exploits iOS Zero-Day Chain for Covert Surveillance In a recent revelation, a sophisticated iOS zero-day exploit chain has been identified, utilized by mercenary […]
Freedom Mobile Data Breach Exposes Customer Info, Highlights Telecom Security Challenges
Freedom Mobile Data Breach Exposes Customer Information: A Wake-Up Call for Telecom Security In a recent cybersecurity incident, Canadian wireless provider Freedom Mobile disclosed a […]