Wednesday, May 14, 2025

Cyber Security News

Critical 0-Day in Windows DWM

Critical 0-Day in Windows DWM Enables Privilege Escalation

0
Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager (DWM) that is actively being exploited in the wild. The...
Microsoft Patch Tuesday May 2025

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5...

0
Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across its software portfolio, including Windows, Microsoft Office, Azure, and Visual...
Ivanti Released Security Updates

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

0
Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several products, including Endpoint Manager Mobile (EPMM), Neurons for ITSM...
Fortinet FortiVoice Zero-Day

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

0
A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products, including FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera. A critical zero-day vulnerability...
Ransomware Attacks

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

0
The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware attacks during 2024, driven largely by sophisticated exploitation of...
Mythic Framework

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

0
Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity threats are changing quickly. Recently, a team of security professionals...
Swan Vector APT

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

0
A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs, has been targeting educational institutions and mechanical engineering industries in...
SIEM as a Service

Recent News

COLDRIVER Hackers

Russian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information

0
The Google Threat Intelligence Group (GTIG) has uncovered a sophisticated new malware dubbed LOSTKEYS, attributed to the Russian government-backed threat actor COLDRIVER, also known...

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks

0
A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows Remote Management (WinRM), a legitimate administrative tool, to move laterally...
medical malpractice lawyers

Get Help From Experienced Medical Malpractice Lawyers

0
Columbus, Ohio, is a city of innovation, home to world-class hospitals, medical research hubs, and a thriving health and wellness community. For many residents,...
DDoS-for-Hire

Europol Dismantles DDoS-for-Hire Network and Arrests Four Administrators

0
Significant blow to cybercriminal infrastructure, Europol has coordinated an international operation resulting in the arrest of four individuals in Poland who allegedly operated six...
Haulage Firm Falls

160-Year-Old Haulage Firm Falls After Cyber-Attack: Director Issues Urgent Warning

0
The 160-year-old haulage giant Knights of Old, once a stalwart of the UK’s logistics sector, was forced into administration in 2023 following a devastating...
PoC Exploit Published for macOS Sandbox

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

0
Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied by a proof-of-concept (PoC) exploit demonstrating partial sandbox bypass via...
Phishing Scams on the Rise with Sophisticated PhaaS

Sophisticated PhaaS Phish Toolkits are Now Genetrating Realistic Fake Phishing Pages

0
Cybersecurity experts are raising alarms over the proliferation of increasingly sophisticated phishing techniques that leverage dedicated Phishing-as-a-Service (PhaaS) toolkits to create authentic-looking pages. These...
Lumma Stealer

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

0
Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools and advanced evasion tactics,...
PigButchering Scheme

Researchers Turn the Tables: Scamming the Scammers in Telegram’s PigButchering Scheme

0
Cybersecurity specialists have devised an innovative approach to combat an emerging cybercrime called "PigButchering" on the Telegram platform. This form of cyber fraud involves scammers...

Critical 0-Day in Windows DWM Enables Privilege Escalation

Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager (DWM) that is actively being exploited in the wild. The...

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across its software portfolio, including Windows, Microsoft Office, Azure, and Visual...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several products, including Endpoint Manager Mobile (EPMM), Neurons for ITSM...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products, including FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera. A critical zero-day vulnerability...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware attacks during 2024, driven largely by sophisticated exploitation of...

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity threats are changing quickly. Recently, a team of security professionals...

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs, has been targeting educational institutions and mechanical engineering industries in...

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware and facilitate large-scale password theft. The attack, which was reported by...

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was compromised during a cyber attack that began three weeks ago....

Glossary