In today’s rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated and harder to detect using traditional methods. Security leaders across industries are recognizing artificial intelligence as a transformative force in strengthening defensive capabilities. This paradigm shift is prompting…
Tag: Cyber Security News
100,000+ Installed WordPress Plugin Critical Vulnerability Exploited Within 4 Hours of Disclosure
A severe vulnerability in the popular WordPress plugin SureTriggers has been actively exploited within just four hours of its public disclosure on April 10, 2025. The critical authentication bypass flaw affects all versions of the plugin up to 1.0.78, which…
macOS Users Beware! Hackers Allegedly Offering Full System Control Malwares for Rent
A new concerning threat has emerged in the cybercriminal ecosystem targeting Apple users. A sophisticated macOS malware-as-a-service offering called “iNARi Loader” is being advertised on underground forums. This high-priced stealer represents an alarming evolution in the growing landscape of macOS-specific…
Samsung Galaxy S24 Vulnerability Let Create Arbitrary Files on Affected Installations
A significant vulnerability in Samsung Galaxy S24 devices that allows network-adjacent attackers to create arbitrary files on affected installations. The flaw, identified as CVE-2024-49421, was publicly announced on April 9, 2025, as part of the Pwn2Own competition findings. The vulnerability,…
Third-Party Risk Management – How to Build a Strong TPRM Program
In today’s interconnected business environment, organizations increasingly rely on third-party vendors, suppliers, and partners to deliver critical services and functions. While these relationships drive efficiency and innovation, they also introduce significant risks ranging from data breaches and operational disruptions to…
Hackers Leveraging Teams Messages to Execute Malware on Windows Systems
A new sophisticated attack campaign where cybercriminals are exploiting Microsoft Teams to deliver malware and maintain persistent access to corporate networks. The attacks, which represent an evolution in social engineering tactics, specifically target Windows systems through a novel technique that…
Stealthy Rootkit-Like Malware Known as BPFDoor Using Reverse Shell to Dig Deeper into Compromised Networks
A sophisticated backdoor malware known as BPFDoor has been actively targeting organizations across Asia, the Middle East, and Africa, leveraging advanced stealth techniques to evade detection. This Linux backdoor utilizes Berkeley Packet Filtering (BPF) technology to monitor network traffic at…
Schools and Colleges Emerges as a Prime Target for Threat Actors
Educational institutions worldwide are facing an unprecedented wave of sophisticated cyber attacks, with the education sector ranked as the third-most targeted industry in Q2 2024, according to Microsoft. This alarming trend reveals a strategic shift in threat actors’ focus, as…
Beware of $5 SMS Phishing Attack Targeting Toll Road Users
A widespread and ongoing SMS phishing (smishing) campaign targeting toll road users across the United States has been identified, posing a significant threat to motorists’ financial security. Since mid-October 2024, cybercriminals have been impersonating legitimate toll road payment services such…
The Rise of Cyber Insurance – What CISOs Need to Consider
As we move through 2025, Chief Information Security Officers (CISOs) face an increasingly complex threat landscape characterized by sophisticated ransomware attacks, evolving regulatory requirements, and expanding attack surfaces. Amid these challenges, cyber insurance has emerged as a critical component of…