Cyber News

New Microsoft 365 Vulnerability – LFI Flaw Allows Attackers to Extract Sensitive Server Data via PDF Export

A security researcher has disclosed a significant Local File Inclusion (LFI) vulnerability in Microsoft Graph APIs that allowed attackers to…

10 months ago

Google Introduces Robust Chrome Security for High-Risk Users on Android with New Protection Features

Google has unveiled significant security enhancements for Chrome on Android through its Advanced Protection Program, specifically targeting journalists, elected officials,…

10 months ago

Critical RCE Flaw in Windows and Server Systems Fixed by Microsoft

On July 8, 2025, Microsoft and CVE.org disclosed a critical security flaw, CVE-2025-47981, affecting the SPNEGO Extended Negotiation (NEGOEX) security mechanism—a…

10 months ago

New Threat Alert – SparkKitty Malware Targets iOS and Android Users to Steal Photos from Galleries

A newly discovered Trojan malware, SparkKitty, is raising alarms across the cybersecurity community after infiltrating official app stores and untrusted…

10 months ago

Exploring the Role of Cloud Giants Like Amazon and Microsoft in Concealing Infrastructure Through FUNNULL Admin Accounts

Recent research by Silent Push Threat Analysts, in partnership with Brian Krebs, has brought a sharp focus to the sprawling…

10 months ago

Chinese Cybercriminals Target Microsoft Exchange Servers to Steal Vital COVID-19 Research Data

Houston, July 9, 2025 — In a landmark operation, the U.S. Justice Department announced the arrest of Xu Zewei, a 33-year-old…

10 months ago

Android Vulnerability – TapTrap Attack Lets Malicious Apps Evade Permissions and Cause Damage

Researchers from TU Wien and the University of Bayreuth have discovered a critical Android vulnerability called TapTrap that allows malicious…

10 months ago

Iranian Pay2Key Group Leverages PowerShell to Evade Windows Defender and Encrypt Systems

A sophisticated Iranian-backed ransomware operation has emerged as a significant threat to Western organizations, utilizing advanced PowerShell techniques to bypass…

10 months ago

Exploiting IIS Hosted Sites – Hackers Leveraging Compromised Machine Keys to Breach Organizations – TGR-CRI-0045

Cybersecurity researchers from Unit 42 have uncovered a sophisticated campaign by an initial access broker (IAB) group dubbed TGR-CRI-0045, which…

10 months ago

Government Entities Targeted by DoNot APT with Custom Windows Malware

Security researchers have uncovered a sophisticated cyber espionage campaign targeting European diplomatic institutions, attributed to the DoNot APT group (also…

10 months ago