Linux cyber threats are less widespread than Windows ones yet it can make them even more dangerous. Underestimated and under-anticipated, they stab endpoints and networks in the back, bringing operational disruption and financial loss. It’s true that individual desktop users…
Tag: Cyber Security News
Data Poisoning: The Next Evolution of Ransomware That No One is Ready For
For many years, ransomware has been associated with online extortion, causing businesses to become immobilized as they attempt to recover encrypted data. With cybersecurity teams preparing for these direct attacks, organizations have become accustomed to the risk of frozen systems…
Why 78% of Security Leaders Are Rethinking Their Entire Cyber Strategy in 2025
In the rapidly evolving digital landscape of 2025, cybersecurity has reached an inflection point that has prompted an unprecedented reassessment among security professionals. According to recent industry analysis, 78% of security leaders are completely rethinking their cyber strategies a striking…
Spotting Phishing Attacks with Image Verification Techniques
An interconnected digital landscape differentiates the current era from previous ones, as using the internet for various personal and professional purposes was uncommon then. While this phenomenon has eased multiple tasks for people of different demographics, it has also resulted…
New PasivRobber Malware Steals Data From macOS Systems and Applications
A sophisticated Chinese spyware suite dubbed “PasivRobber” that targets macOS devices, with particular focus on harvesting data from communication applications popular among Chinese users. The multi-binary malware package demonstrates advanced technical capabilities for data exfiltration and persistence. On March 13,…
Hackers Exploiting EC2 Instance Metadata Vulnerability to Attacks Websites Hosted
A newly uncovered campaign targeting websites hosted on Amazon EC2 instances has raised alarms across the cybersecurity community. Since mid-March 2025, threat actors have been exploiting a combination of Server-Side Request Forgery (SSRF) vulnerabilities and Amazon’s EC2 Instance Metadata Service…
Microsoft Disables ActiveX by Default in 365 to Block Malware Execution by Hackers
Microsoft has taken a critical step to enhance security across its productivity suite by disabling ActiveX controls by default in Microsoft 365 applications. This significant security update, which began rolling out earlier this month, aims to reduce the risk of…
Malicious JScript Loader Jailbreaked to Uncover Xworm Payload Execution Flow
Cybersecurity researchers have uncovered a sophisticated multi-stage attack chain utilizing JScript to deliver dangerous malware payloads. The attack, which employs a complex obfuscation technique, ultimately delivers either XWorm or Rhadamanthys malware depending on the victim’s geographic location. This loader operates…
Microsoft Asks Windows 11 Users Not to Delete Mysterious “inetpub” Folder
A seemingly empty folder appearing on Windows systems after recent security updates has raised concerns among users, but Microsoft confirms it’s an intentional security measure that should remain untouched. The directory, typically located at C:\inetpub, serves as a crucial component…
Newly Purchased Android Phones With Pre-installed Malware Mimic as WhatsApp
A sophisticated cryptocurrency theft operation has been uncovered where brand-new Android smartphones arrive with pre-installed malware masquerading as legitimate WhatsApp applications. Threat actors have infiltrated the supply chain of several Chinese smartphone manufacturers, embedding malicious code directly into system applications…