Cyber News

Critical HIKVISION applyCT Vulnerability Exposes Devices to Remote Code Execution Risks

A critical vulnerability in HIKVISION's applyCT security management platform that could allow attackers to execute arbitrary code on affected systems…

10 months ago

Phishing Attack Exploits Microsoft 365 Direct Send, Impersonates Internal Users

A recent wave of sophisticated phishing attacks has successfully bypassed traditional email security measures by exploiting a lesser-known feature within…

10 months ago

Critical PHP Vulnerabilities Enable SQL Injection and DoS Attacks – Update Immediately

Critical security vulnerabilities have been discovered in PHP's PostgreSQL and SOAP extensions that could enable SQL injection attacks and denial…

10 months ago

Israeli Cybersecurity Experts and Professors Targeted by Iranian APT35 Hackers

Amid heightened tensions between Iran and Israel, cybersecurity researchers have uncovered a sophisticated and ongoing cyber-espionage campaign targeting Israeli journalists,…

10 months ago

Researchers Exploit HTML Injection to Bypass Content Security Policy

A sophisticated method to bypass Content Security Policy (CSP) nonces, a widely-used web security mechanism designed to prevent cross-site scripting…

10 months ago

Entra Cross-Tenant SaaS Apps Compromised by nOAuth Abuse, Resulting in Account Hijacking

A recent security investigation by Semperis has uncovered a critical vulnerability in Microsoft Entra ID (formerly Azure Active Directory) integrations,…

10 months ago

Android Spyware Catwatchful Exposes Credentials of Over 62,000 Customer Accounts

A major security vulnerability in the Android stalkerware service Catwatchful has exposed the plaintext login credentials of over 62,000 users,…

10 months ago

New ‘123 | Stealer’ Offered on Underground Hacking Forums for $120/Month

A new credential-harvesting malware known as “123 | Stealer” has surfaced on a prominent English-speaking cybercrime forum, with the threat…

10 months ago

Phishing Attack in Iran Imitates Google, Outlook, and Yahoo Domains

In a striking example of the evolving landscape of cyber warfare, Iranian state-linked hackers have launched a highly sophisticated global…

10 months ago

LLM Models Exploited by Cybercriminals to Enhance Hacking Operations

Cybercriminals are rapidly adopting artificial intelligence (AI) technologies, specifically large language models (LLMs), to streamline and amplify their illicit activities. …

10 months ago