Cyber News

U.S. Critical Infrastructure Under Siege – Iranian Threat Actors Target Water Systems and More

In recent weeks, U.S. water treatment facilities and other critical infrastructure have come under sustained digital assault attributed to Iranian-linked…

10 months ago

Octalyn Malware – Stealing VPN Data, Passwords, and Cookies Through Organized Folder Structure

Cybersecurity researchers have uncovered a sophisticated credential-stealing malware known as Octalyn, publicly hosted on GitHub under the guise of a…

10 months ago

67 Malicious npm Packages Used by North Korean Hackers to Spread XORIndex Malware

A newly identified wave of malicious software supply chain activity linked to North Korea has infiltrated the popular JavaScript package…

10 months ago

Samsung WLAN AP Vulnerabilities Enable Remote Root Command Execution

A critical vulnerabilities in Samsung's WEA453e WLAN Access Point in August 2020, revealing a chain of exploits that culminate in…

10 months ago

Oracle Addresses 309 Security Vulnerabilities in Latest Critical Patch Update

Oracle has released its quarterly Critical Patch Update (CPU) for July 2025, addressing a substantial 309 security vulnerabilities across its…

10 months ago

Exposing the Deception – 17,000+ Fraudulent News Sites Revealed for Investment Scams

A comprehensive investigation by cybersecurity firm CTM360 has uncovered a massive network of over 17,000 fraudulent news sites operating across…

10 months ago

Microsoft Issues Warning on Expired Windows Secure Boot Certificate

Microsoft has issued an urgent warning to Windows users about upcoming Secure Boot certificate expirations that could significantly impact device…

10 months ago

Google’s AI ‘Big Sleep’ Identifies SQLite 0-Day Vulnerability in Active Use

Google's artificial intelligence-powered security tool Big Sleep has achieved a cybersecurity milestone by discovering and preventing the active exploitation of…

10 months ago

Cyber Rebels Targeting Critical ICS Infrastructure – A Surge in Data Theft and Disruption

In a marked escalation of hacktivist operations, ideologically driven “cyber rebels” are shifting focus from traditional website defacements and denial-of-service…

10 months ago

Gmail Exploit Used to Trigger Code Execution in Claude AI

A cybersecurity researcher has successfully demonstrated how a carefully crafted Gmail message can trigger code execution through Claude Desktop, Anthropic's…

10 months ago