Citrix has recently disclosed multiple high-severity vulnerabilities in its NetScaler Application Delivery Controller (ADC) and NetScaler Gateway products. Among these, CVE-2025-7775 stands out due to […]
Category: Cybersecurity News
Stay informed about the ever-evolving world of digital threats and defenses with our Cyber Security News category. Here, you’ll find the latest breaking news, in-depth analysis, and expert insights on everything related to cybersecurity. From data breaches and ransomware attacks to emerging threats and innovative security solutions, we cover the critical issues impacting individuals, businesses, and governments worldwide. Keep up-to-date on the latest vulnerabilities, best practices, and trends shaping the future of online security.
Sophisticated Phishing Campaign Targets ScreenConnect Cloud Administrators
A sophisticated credential harvesting campaign, identified as MCTO3030, has been actively targeting ScreenConnect cloud administrators since 2022. This operation employs spear-phishing tactics to steal super […]
PromptLock: The Emergence of AI-Driven Ransomware
In a groundbreaking development, cybersecurity researchers have identified PromptLock, the first known ransomware leveraging artificial intelligence (AI) to generate its malicious components. Discovered by the […]
Enhancing SOC Efficiency: Rapid Incident Triage with Advanced Threat Intelligence
In the fast-paced realm of cybersecurity, Security Operations Centers (SOCs) are inundated with a deluge of alerts daily. The ability to swiftly and accurately triage […]
Critical Vulnerabilities in Securden Unified PAM Allow Authentication Bypass and System Compromise
Cybersecurity researchers have identified a series of critical vulnerabilities in Securden Unified Privileged Access Management (PAM) software, notably an authentication bypass flaw designated as CVE-2025-53118 […]
Emergence of Hook Version 3: A New Era in Android Banking Malware
A new and highly sophisticated variant of the Hook Android banking trojan, known as Hook Version 3, has surfaced, marking a significant advancement in mobile […]
Unveiling Mustang Panda: China’s Elite Cyber Espionage Group and Its Evolving Tactics
Since at least 2014, Mustang Panda, a China-based advanced persistent threat (APT) group, has established itself as a formidable force in the realm of cyber […]
Critical Chrome Use-After-Free Vulnerability Allows Remote Code Execution
Google has recently issued an urgent security update for its Chrome browser to address a critical use-after-free vulnerability identified as CVE-2025-9478. This flaw resides within […]
Salesloft Drift Compromise Leads to Unauthorized Access and Data Exfiltration from Salesforce Instances
In a recent and sophisticated cyberattack, a threat actor identified as UNC6395 exploited vulnerabilities in the Salesloft Drift application to gain unauthorized access to corporate […]
Emergence of Cephalus Ransomware: Exploiting Remote Desktop Protocol for Initial Access
A new ransomware variant, dubbed Cephalus, has surfaced, posing a significant threat to organizations by exploiting vulnerabilities in Remote Desktop Protocol (RDP) connections. Named after […]