Saturday, May 31, 2025

Cyber Security News

Microsoft Entra

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

0
A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID and Azure environments, where attackers can exploit lesser-known billing...
Google Apps Script

Threat Actors Exploit Google Apps Script to Host Phishing Sites

0
The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development platform within Google’s ecosystem...
Tycoon2FA

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

0
Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by the notorious hacker group Storm-1575, also known as "Dadsec." Since...
Ransomware

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

0
Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers, targeting unsuspecting users and businesses across multiple industries. These...
Windows 11

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

0
Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems in a thorough technical...

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

0
A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security gap in Microsoft Entra ID that could allow external...
AiTM Attacks

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks

0
Microsoft has exposed the escalating sophistication of phishing attacks, particularly focusing on Adversary-in-the-Middle (AiTM) techniques that are becoming a cornerstone of modern cyber threats. As...
SIEM as a Service

Recent News

Phishing Attack

Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack

0
Threat actors have orchestrated a multi-wave phishing campaign between April and May 2025, leveraging the legitimate infrastructure of Niftycom, a prominent Japanese Internet Service...
Earth Lamia Hackers

Earth Lamia Hackers Exploits Vulnerabilities in Web Applications to Attack Multiple Industries

0
Cybersecurity researchers at Trend Research have uncovered the aggressive operations of Earth Lamia, an Advanced Persistent Threat (APT) group with a China-nexus, targeting organizations...

SentinelOne Recovers: Platform Back Online After Extended Outage

0
On May 29, 2025, SentinelOne, a leading cybersecurity provider, experienced a significant platform outage that disrupted access to its commercial customer consoles worldwide. The...
PE Header

Novel Malware Evades Detection by Skipping PE Header in Windows

0
Researchers have identified a sophisticated new strain of malware that bypasses traditional detection mechanisms by entirely omitting the Portable Executable (PE) header in Windows...
Ransomware

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

0
Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers, targeting unsuspecting users and businesses across multiple industries. These...

Safari Flaw Exploited by BitM Attack to Steal User Login Data

0
A new wave of phishing attacks, known as Fullscreen Browser-in-the-Middle (BitM) attacks, is exploiting browser features to steal user credentials with unprecedented stealth. Unlike...

Victoria’s Secret Website Taken Offline After Cybersecurity Breach

0
Victoria’s Secret, the iconic lingerie retailer, has taken its US website offline and suspended some in-store services following a major cybersecurity incident. Customers attempting...

Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access

0
Critical security flaws have been identified in the eCharge Hardy Barth cPH2 and cPP2 charging stations, specifically affecting firmware version 2.2.0. These vulnerabilities, discovered...

Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use

0
A newly disclosed vulnerability, CVE-2024-6914, has shocked the enterprise software community, affecting a wide range of WSO2 products. The flaw, rated with a CVSS...

The Role of Social Engineering in Business Email Compromise Attacks

Business Email Compromise (BEC) attacks have rapidly become one of the most financially damaging forms of cybercrime in the world. Unlike traditional attacks that...

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID and Azure environments, where attackers can exploit lesser-known billing...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development platform within Google’s ecosystem...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by the notorious hacker group Storm-1575, also known as "Dadsec." Since...

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security gap in Microsoft Entra ID that could allow external...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers, targeting unsuspecting users and businesses across multiple industries. These...

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems in a thorough technical...

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates

A critical vulnerability (CVE-2025-48057) has been discovered in Icinga 2, the widely used open-source monitoring platform. The flaw, affecting installations built with OpenSSL versions older...

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks

Microsoft has exposed the escalating sophistication of phishing attacks, particularly focusing on Adversary-in-the-Middle (AiTM) techniques that are becoming a cornerstone of modern cyber threats. As...

Glossary