Cyber News

Microsoft AppLocker Vulnerability Allows Malicious Apps to Bypass Restrictions

A configuration vulnerability in Microsoft's AppLocker security feature that could potentially allow certain applications to bypass system restrictions. The discovery…

9 months ago

Critical Livewire Vulnerability Puts Millions of Laravel Applications at Risk of Remote Code Execution

A critical security vulnerability has been discovered in Livewire v3, a popular full-stack framework for Laravel that enables developers to…

9 months ago

Cyberattack on Key Russian Drone Supplier Allegedly Launched by Ukraine Hackers

Ukrainian military intelligence operatives reportedly executed a sophisticated cyber operation against Gaskar Integration, one of Russia’s principal suppliers of unmanned…

9 months ago

Microsoft SharePoint Server 0-Day RCE Actively Exploited, CISA Issues Urgent Warning

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability in Microsoft SharePoint…

9 months ago

New 7-Zip Vulnerability Lets RAR5 Files Crash Systems

A critical vulnerability in the popular 7-Zip file archiver has been discovered and patched, allowing malicious actors to craft weaponized…

9 months ago

PoisonSeed Attack Exploits MFA by Tricking Users into Scanning Malicious QR Codes

A sophisticated new attack technique that exploits FIDO key authentication systems by tricking users into scanning malicious QR codes with…

9 months ago

SharePoint 0-Day RCE Vulnerability Allowing Full Server Compromise

A critical zero-day vulnerability in Microsoft SharePoint servers, designated CVE-2025-53770, that allows attackers to achieve remote code execution without authentication.…

9 months ago

Active Exploitation of New CrushFTP 0-Day Vulnerability Grants Attackers Server Access

A critical zero-day vulnerability in CrushFTP servers has been actively exploited by attackers since July 18th, 2025, with security researchers…

9 months ago

Semiconductor Industry Under Siege – Chinese Hackers Use Weaponized Cobalt Strike in State-Sponsored Attacks

Between March and June 2025, cybersecurity researchers at Proofpoint documented an alarming escalation in Chinese state-sponsored cyber espionage targeting Taiwan's…

9 months ago

Inside Hacktivism – How Groups Are Capturing Attention and Choosing Their Targets

A comprehensive analysis of nearly 700 hacktivist groups reveals a sophisticated ecosystem where cyber-activism meets psychological warfare, as these digital…

10 months ago