The commodity infostealer landscape has a new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API to spirit away victims’ browser secrets. First seen in mid-July 2025 on a GitHub repository operated by the self-styled ZeroTrace…
Tag: Cyber Security News
Linux 6.16 Released – Optimized for Better Performance and Networking
The Linux Foundation has officially released Linux kernel 6.16 on July 27, 2025, marking another milestone in open-source operating system development. Released by Linus Torvalds, this version focuses on stability improvements and networking enhancements while maintaining the project’s commitment to…
Apple’s New Containerization Feature Allows Kali Linux Integration on macOS
Apple quietly slipped a game-changing developer feature into its WWDC 25 announcements: a native containerization stack that lets Macs run Open Container Initiative (OCI) images inside ultra-lightweight virtual machines. In practice, that means you can launch a full Kali Linux…
CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical vulnerability in PaperCut NG/MF print management software that threat actors are actively exploiting in ransomware campaigns. The vulnerability, tracked as CVE-2023-2533, represents a significant security risk to organizations worldwide using the…
10 Best Virtual Machine (VM) Monitoring Tools in 2025
VM (Virtual Machine) monitoring tools are essential for maintaining the performance, availability, and security of virtualized environments. These tools provide real-time visibility into VM health and performance, enabling administrators to track key metrics such as CPU usage, memory utilization, disk…
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remote Control
Cybersecurity researchers have uncovered a sophisticated web shell attack targeting Microsoft Internet Information Services (IIS) servers, allowing threat actors to achieve complete remote control over compromised systems. The malicious script, identified as “UpdateChecker.aspx,” represents a significant escalation in web shell…
Critical macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC
A critical macOS vulnerability enables attackers to bypass Transparency, Consent, and Control (TCC) protections and steal sensitive user data, including files from protected directories and Apple Intelligence caches. The vulnerability, dubbed “Sploitlight,” exploits Spotlight plugins to access normally protected information…
10 Best Anti-Phishing Tools in 2025
Anti-phishing tools are essential cybersecurity solutions designed to detect and prevent phishing attacks. These tools identify and block malicious emails, websites, and messages that attempt to deceive users into disclosing sensitive information such as passwords, credit card numbers, and personal…
CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding two critical injection vulnerabilities in Cisco’s Identity Services Engine (ISE) that threat actors are actively exploiting. The vulnerabilities, tracked as CVE-2025-20281 and CVE-2025-20337, allow attackers to achieve remote code execution with root privileges…
GitHub Outage Disrupts Core Services Globally for Users
GitHub experienced a widespread outage on July 28, 2025, affecting millions of developers and organizations reliant on its services. The incident, which impacted API requests, issue tracking, and pull requests, highlighted the vulnerabilities in cloud-based collaboration tools essential for software…