Oracle has recently identified a significant security flaw within its E-Business Suite, designated as CVE-2025-61884. This vulnerability permits remote, unauthenticated attackers to access sensitive configuration […]
Category: Cybersecurity News
Stay informed about the ever-evolving world of digital threats and defenses with our Cyber Security News category. Here, you’ll find the latest breaking news, in-depth analysis, and expert insights on everything related to cybersecurity. From data breaches and ransomware attacks to emerging threats and innovative security solutions, we cover the critical issues impacting individuals, businesses, and governments worldwide. Keep up-to-date on the latest vulnerabilities, best practices, and trends shaping the future of online security.
SonicWall SSLVPN Devices Targeted Following Massive Firewall Backup Breach
In early October 2025, a significant escalation in cyberattacks targeted SonicWall SSLVPN devices, compromising numerous customer networks. This surge occurred shortly after a major security […]
RealBlindingEDR: A Tool That Disables Antivirus and EDR Systems via Kernel Callbacks
In late 2023, a tool named RealBlindingEDR emerged on GitHub, offering the capability to disable antivirus (AV) and endpoint detection and response (EDR) systems on […]
Stealit Malware Exploits Node.js SEA to Target Windows Systems
A sophisticated malware campaign known as Stealit has recently emerged, targeting Windows systems by exploiting the Node.js Single Executable Application (SEA) feature. This approach allows […]
Critical Vulnerability in Happy DOM Exposes Millions to Remote Code Execution Risks
A critical security vulnerability has been identified in Happy DOM, a widely used JavaScript Document Object Model (DOM) implementation, affecting all versions up to v19. […]
Unveiling EDR-Freeze: A Novel Technique to Temporarily Suspend Security Software
In the ever-evolving landscape of cybersecurity, adversaries continually develop sophisticated methods to circumvent protective measures. A recent analysis by researcher Itamar Hällström has shed light […]
Cybercriminals Exploit Discord Webhooks for Covert Command-and-Control in npm, PyPI, and RubyGems Packages
In recent developments, cybercriminals have innovatively repurposed Discord webhooks as clandestine command-and-control (C2) channels across various programming language ecosystems, including npm, PyPI, and RubyGems. This […]
Critical Vulnerability in AMD SEV-SNP Exposes Confidential Data to Potential Exfiltration
A significant security flaw has been identified in AMD’s Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP), a technology integral to confidential computing environments utilized […]
Astaroth Banking Trojan Exploits GitHub to Conceal Malicious Configurations
A new variant of the Astaroth banking trojan has surfaced, employing innovative tactics to distribute its malicious configuration files. First identified in late 2025, this […]
Enhancing Device Identity Verification with Microsoft Intune MDM and Entra ID
Recent research has unveiled a more reliable method for verifying device and tenant identities by leveraging Microsoft Intune’s Mobile Device Management (MDM) certificates. This approach […]