Cyber News

Unveiling the Lumma Password Stealer – Attack Pathways and Escalation Strategies Exposed

WithSecure Detection and Response Team researchers have published a new technical analysis of the Lumma information stealer, revealing the malware's…

9 months ago

Dark Web Breach – Lionishackers Sell Stolen Corporate Databases

A financially motivated threat actor known as "Lionishackers" has emerged as a significant player in the corporate database theft market,…

9 months ago

Phishing Attacks Target Belgian Grand Prix Fans and Teams

Cybercriminals are intensifying their efforts to exploit Formula 1 enthusiasts and racing teams ahead of the 2025 Belgian Grand Prix…

9 months ago

New Web Shell Script Targets IIS Servers for Full Remote Control by Hackers

Security researchers from FortiGuard have uncovered a sophisticated web shell script, "UpdateChecker.aspx," that grants attackers comprehensive remote control over compromised…

9 months ago

Exploit of ArmouryLoader – Circumventing Security Measures to Inject Malicious Code

A sophisticated malware loader known as ArmouryLoader has emerged as a significant cybersecurity threat, demonstrating advanced techniques to bypass endpoint…

9 months ago

Apple Fixes Several Vulnerabilities, Including Safari Vulnerability Exploited as Chrome 0-Day

Apple released a comprehensive set of security updates on July 29, 2025, addressing vulnerabilities across its entire ecosystem of devices…

9 months ago

Dropbox Passwords Closing – Export by October 28, 2025

Dropbox has announced the discontinuation of its password management service, Dropbox Passwords, effective October 28, 2025, as the company shifts…

9 months ago

ToolShell – Unveiling Five Critical Vulnerabilities in Microsoft SharePoint

Security researchers and national Computer Emergency Response Teams (CERTs) worldwide issued urgent alerts on July 19-20, 2025, regarding active exploitation…

9 months ago

WordPress Theme RCE Vulnerability Actively Exploited to take Full Site Control

A critical security vulnerability in the popular "Alone" WordPress theme has been actively exploited by cybercriminals to gain complete control…

9 months ago

BeyondTrust Privilege Management for Windows Vulnerability Allows Attackers to Escalate Privileges

A critical security vulnerability has been discovered in BeyondTrust's Privilege Management for Windows software that enables local authenticated attackers to…

9 months ago