Cyber News

Katz Stealer Upgrades – Advanced Credential Theft with System Fingerprinting and Persistence Tactics

Cybersecurity researchers have issued fresh warnings following the discovery of significant upgrades to the Katz Stealer, a rapidly evolving information-stealing malware…

10 months ago

OPPO Clone Phones Weak WiFi Hotspot Poses Risk to Sensitive Data

A critical security vulnerability has been discovered in OPPO Clone Phone devices that could expose users' sensitive information through poorly…

10 months ago

PyPI Repositories Targeted – Hackers Deploy Malicious Packages to Steal AWS, CI/CD, and macOS Data

In a stark reminder of the vulnerabilities inherent in open-source ecosystems, new revelations confirm that attackers are targeting Python Package…

10 months ago

Xiaomi App Vulnerability Allows Hackers to Gain Unauthorized Access to Devices

Xiaomi has disclosed a critical security vulnerability in its interoperability application that could allow attackers to gain unauthorized access to…

10 months ago

Uncovering Hidden Malware in JPEGs Using Steganography and Base64

Security researchers continually refine their tactics to detect the latest malware delivery methods. One increasingly common technique is the use…

10 months ago

WinRAR Directory Vulnerability Allows Arbitrary Code Execution via Malicious File

A critical security vulnerability has been discovered in RARLAB's popular WinRAR archiving software that allows remote attackers to execute arbitrary…

10 months ago

Aviatrix Cloud Controller Authentication Vulnerabilities Allows Remote Code Execution by Attackers

A two severe security vulnerabilities in Aviatrix Controller, a popular Software-Defined Networking (SDN) utility used to create links between different…

10 months ago

Cybercriminals Exploit Fake Travel Sites to Spread XWorm Malware

In the first quarter of 2025, cybercriminals launched a large-scale malware campaign targeting holiday bookers by creating fake travel websites…

10 months ago

New Echo Chamber Attack Hacks Most AI Models by Exploiting Indirect References

A sophisticated new jailbreak technique that successfully bypasses the safety mechanisms of leading artificial intelligence models with alarming effectiveness. The…

10 months ago

Linux Machines Targeted by BERT Ransomware with Enhanced ELF Exploits

First observed in March 2025 targeting Windows systems, the BERT ransomware group escalated its operations in May 2025 by launching…

10 months ago