Cybercriminals have allegedly compromised Airpay, one of India’s prominent digital payment gateway providers, exposing sensitive financial data of thousands of users and businesses. The threat actors are currently advertising the company’s complete database on dark web marketplaces, raising serious concerns…
Tag: Cyber Security News
New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control
A critical new threat targeting Microsoft SharePoint servers through a sophisticated exploit chain dubbed “ToolShell.” This multi-stage attack combines previously patched vulnerabilities with fresh zero-day exploits to achieve complete system compromise, affecting SharePoint Enterprise Server 2016, SharePoint Server 2019, and…
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations
A major cybersecurity breach has exposed the browsing activities of users visiting one of the internet’s most notorious illegal marketplaces. On Friday, July 18, cybersecurity firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million records of web requests,…
Hackers Compromise Intelligence Website Used by CIA and Other Agencies
Unidentified hackers have successfully breached a critical intelligence website used by the CIA and other U.S. agencies to manage sensitive government contracts, according to the National Reconnaissance Office (NRO), the spy satellite service that operates the compromised platform. The cyberattack…
12 Best Infrastructure Monitoring Tools in 2025
Infrastructure monitoring tools are critical for ensuring IT infrastructure’s optimal performance, availability, and security. These tools provide comprehensive visibility into the health and status of various infrastructure components, including servers, networks, storage systems, and applications. Infrastructure monitoring tools help detect…
10 Best Cloud Monitoring Tools in 2025
Cloud monitoring tools are essential for maintaining cloud-based services and applications’ performance, availability, and security. These tools provide real-time visibility into cloud infrastructure, enabling monitoring metrics such as resource utilization, application performance, and network traffic. Cloud monitoring tools help identify…
LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access
A serious security vulnerability has been discovered in LG Innotek’s LNV5110R camera model that could allow cybercriminals to gain complete administrative control over affected devices. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on July 24, 2025,…
Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely
Multiple critical security vulnerabilities affecting Salesforce’s Tableau Server that could allow attackers to execute remote code, bypass authorization controls, and access sensitive production databases. The vulnerabilities, revealed through a security advisory published on June 26, 2025, impact Tableau Server versions…
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm
An Arizona woman received a significant federal prison sentence for orchestrating a sophisticated cybercrime operation that enabled North Korean Information Technology (IT) workers to infiltrate hundreds of American companies while generating millions in revenue for the Democratic People’s Republic of…
Weekly Cybersecurity News Recap : Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks
Welcome to this week’s Cybersecurity Recap. We’re looking at important updates from July 21-27, 2025, in the world of digital threats and defenses. This week has seen significant developments that highlight the ongoing risks of cyber attacks and the need…