Cybercriminals have developed a sophisticated method to steal credit card information by embedding malicious scripts within <img> tags on e-commerce websites. This technique, often associated with MageCart attacks, exploits the trustworthiness of image tags to evade detection while targeting platforms…
Tag: Cyber Security News
Hackers Hiding Credit Card Stealer Script Within
EagerBee Malware Attacking Government Entities & ISPs To Deploy Backdoor
A sophisticated malware framework dubbed EagerBee is actively targeting government agencies and Internet Service Providers (ISPs). EagerBee is actively targeting these organizations across the Middle East. While the EagerBee was found deploying advanced backdoor capabilities through novel technical implementations. The…
Earth Preta Abuse Microsoft Application Virtualization Injector To Inject Malicious Payloads
Advanced Persistent Threat (APT) group Earth Preta (a.k.a. Mustang Panda) has been observed weaponizing the Microsoft Application Virtualization Injector (MAVInject.exe) to bypass security software and implant backdoors in government systems across Asia-Pacific regions. The campaign, analyzed by Trend Micro’s Threat…
Free Security Incident Response Toolkit Released to Detect Cyber Intrusions
In a significant development for cybersecurity professionals and organizations worldwide, SecTemplates has announced the release of its Incident Response Program Pack 1.5, a free, open-source toolkit designed to streamline the implementation of robust security incident response protocols. This release provides…
Juniper Warns of Critical Authentication Bypass Vulnerability Affecting Multiple Products
Juniper Networks has issued an urgent security advisory addressing a critical API authentication bypass vulnerability (CVE-2025-21589) affecting its Session Smart Router, Session Smart Conductor, and WAN Assurance Managed Router product lines. The flaw, carrying a maximum CVSS base score of…
Indian Authorities Seize Loot From Collapsed BitConnect Crypto Scam
In a significant crackdown on one of India’s largest cryptocurrency frauds, the Enforcement Directorate (ED) has seized digital assets valued at ₹1,646 crore linked to the now-defunct BitConnect lending program. The operation, conducted under the Prevention of Money Laundering Act (PMLA),…
DarkMind A Novel Backdoor Attack Exploits Reasoning Capabilities of Customized LLMs
A groundbreaking study by researchers Zhen Guo and Reza Tourani at Saint Louis University has exposed a novel vulnerability in customized large language models (LLMs) like GPT-4o and LLaMA-3. Dubbed DarkMind, this backdoor attack exploits the reasoning capabilities of LLMs…
Unauthorized Access to Grok-3 AI Achieved via Client-Side Code Exploitation – Researcher Claim
A researcher with the handle “single mode” has demonstrated how client-side code manipulation can bypass access controls and gain unauthorized access to Grok-3, an AI model integrated into Elon Musk’s X platform. The exploit involves running a custom JavaScript snippet…
Vgod RANSOMWARE Encrypt Your Entire System and Set A Ransom Notes As Wallpaper
A new ransomware strain dubbed Vgod has emerged recently as a critical cybersecurity threat. This new ransomware employs advanced encryption techniques and psychological pressure tactics. While the ransomware do so by altering the desktop wallpapers of the targeted victims. First…
LibreOffice Vulnerabilities Let Attackers Write to Arbitrary File & Extract Values
Critical vulnerabilities in LibreOffice (CVE-2024-12425 and CVE-2024-12426) allow attackers to overwrite arbitrary files and retrieve sensitive system data via malicious documents. These flaws affect both desktop users and server-side implementations, posing significant risks to enterprises and individual users relying on…