A sophisticated cybercriminal network operating from Pakistan has constructed over 300 cracking websites since 2021, serving as distribution platforms for information-stealing malware that targets users seeking pirated software. This extensive operation represents one of the largest documented cases of coordinated…
Tag: Cyber Security News
Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide
European law enforcement agencies have successfully dismantled a sophisticated cryptocurrency investment fraud network that laundered EUR 460 million in illicit profits from over 5,000 victims globally. The coordinated operation, executed on June 25, 2025, represents one of the largest international…
Microsoft Teams to Let Users Add Agents and Bots in Current Conversations
Microsoft is set to revolutionize user interaction with artificial intelligence agents and bots in Teams through a streamlined integration experience launching in June 2025. The technology giant will deploy this enhanced agent engagement system to a randomized subset of users…
Blind Eagle Hackers Using Open-Source RATs & Ciphers to Hinder Static Detection
The cybersecurity landscape continues to evolve as threat actors adapt their tactics to bypass modern security measures. A recently identified campaign by the Blind Eagle threat group, also known as APT-C-36, demonstrates how sophisticated attackers are leveraging readily available tools…
New C4 Bomb Attack Bypasses Chrome’s AppBound Cookie Encryption
A critical vulnerability that allows low-privileged attackers to decrypt Chrome’s AppBound Cookie Encryption, a security feature Google introduced in July 2024 to protect user cookies from infostealer malware. The attack, dubbed C4 (Chrome Cookie Cipher Cracker), exploits a Padding Oracle…
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely
A critical remote code execution (RCE) vulnerability affecting Django web applications, demonstrating how seemingly benign CSV file upload functionality can be weaponized for complete server compromise. Summary1. Django RCE exploit chains directory traversal with CSV parser abuse to compromise servers…
North Korean Remote IT Workers Added New Tactics and Techniques to Infiltrate Organizations
North Korean state-sponsored remote IT workers have significantly evolved their infiltration tactics, incorporating artificial intelligence tools and sophisticated deception techniques to penetrate organizations worldwide. Since 2024, these highly skilled operatives have enhanced their fraudulent employment schemes by leveraging AI-powered image…
U.S DOJ Announces Nationwide Actions to Combat North Korean Remote IT Workers
The U.S. Department of Justice announced coordinated nationwide law enforcement actions on June 30, 2025, targeting North Korean remote information technology workers’ illicit revenue generation schemes that have defrauded American companies and funded the DPRK’s weapons programs. Summary1. The U.S.…
CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks
CISA has issued an urgent warning regarding a critical buffer overflow vulnerability in Citrix NetScaler ADC and Gateway products, designated as CVE-2025-6543. Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on June 30, 2025, threat actors are actively exploiting this…
Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root
A critical security vulnerability in the widely used Linux Sudo utility has been disclosed, allowing any local unprivileged user to escalate privileges to root access. Summary1. CVE-2025-32463 affects Sudo versions 1.9.14-1.9.17, enabling privilege escalation to root.2. Exploitation uses the chroot…