Fortinet has disclosed a high-severity cross-site scripting (XSS) vulnerability in its FortiSandbox platform, tracked as CVE-2025-52436 (FG-IR-25-093), that enables unauthenticated attackers to execute arbitrary commands on affected systems. Dubbed an “Improper Neutralization of Input During Web Page Generation” issue (CWE-79), the flaw resides in the graphical user interface (GUI) component and scores a 7.9. At […] The post FortiSandbox XSS Vulnerability Let Attackers Run Arbitrary Com...| Cyber Security News
High-performing SOC teams are increasingly turning to sandbox-derived threat intelligence to make threat hunting repeatable and impactful. Tools like ANY.RUN’s TI Lookup enables faster hunts grounded in real attacker behaviours from millions of analyses. Threat hunting remains a cornerstone of mature Security Operations Centers (SOCs), aiming to detect stealthy adversaries before they cause damage. However, […] The post Threat Hunting Is Critical to SOC Maturity but Often Misses Real Atta...| Cyber Security News
Fortinet has disclosed a high-severity authentication bypass vulnerability in FortiOS, tracked as CVE-2026-22153 (FG-IR-25-1052), that could allow unauthenticated attackers to sidestep LDAP authentication for Agentless VPN or Fortinet Single Sign-On (FSSO) policies. Classified under CWE-305 (Authentication Bypass by Primary Weakness), the flaw resides in the fnbamd daemon and requires specific LDAP server configurations enabling unauthenticated […] The post FortiOS Authentication Bypass Vul...| Cyber Security News
Ivanti has released critical security updates for its Endpoint Manager (EPM) platform, addressing two newly discovered vulnerabilities that could enable unauthorized access to sensitive database information and compromise user credentials. The updates, released in version 2024 SU5, also resolve 11 medium-severity vulnerabilities previously disclosed in October 2025. The security advisory highlights two primary vulnerabilities of […] The post Ivanti Endpoint Manager Vulnerability Lets Remote...| Cyber Security News
A deceptive campaign targeting unsuspecting users has emerged, using a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy nodes. The malicious operation relies on a lookalike domain, 7zip[.]com, which closely mimics the legitimate 7-zip.org website, tricking users into downloading a compromised installer that appears fully […] The post Hackers Weaponizing 7-Zip Downloads to Turn Your Home Computers into Proxy Node...| Cyber Security News
SAP’s February 2026 Security Patch Day delivered fixes that SAP urges customers to prioritize to reduce exposure across core enterprise workloads. The release includes 26 new SAP Security Notes and one update to a previously published note. SAP’s monthly bulletin is a remediation guide for vulnerabilities identified in SAP products, with an explicit recommendation to […] The post SAP Security Patch Day – Critical SAP CRM and SAP S/4HANA Code Injection Vulnerabilities Fixed appeared fi...| Cyber Security News
The cybersecurity sector has been impacted by the sudden appearance of “React2Shell” (CVE-2025-55182), a critical vulnerability affecting Next.js and React Server Components. Following its public disclosure on December 4, 2025, threat actors mobilized with alarming speed, launching exploitation attempts against internet-facing systems within just 20 hours. The flaw allows unauthenticated attackers to execute arbitrary code […] The post ILOVEPOOP Toolkit Exploiting React2Shell Vulnerabil...| Cyber Security News
TeamPCP, also known as PCPcat, ShellForce, and DeadCatx3, emerged in December 2025 as a sophisticated cloud-native threat actor targeting exposed Docker APIs, Kubernetes clusters, Ray dashboards, Redis servers, and React2Shell vulnerabilities. The group launched a massive campaign designed to build a distributed proxy and scanning infrastructure at scale, then compromise servers to exfiltrate data, deploy […] The post TeamPCP Industrializes Cloud Misconfigurations Into a Self-Propagating Cy...| Cyber Security News
APT36 and SideCopy continue spying on Indian govt and defense, using phishing and weaponized files to deploy Geta RAT on Windows systems.| Cyber Security News
ValleyRAT malware is spread via fake LINE installers, targeting Chinese users with stealthy loaders to steal credentials and evade detection.| Cyber Security News
Magento stores worldwide were breached after attackers exploited CVE-2025-54236 to reuse session tokens and gain full system control.| Cyber Security News
CISA has issued a warning about a critical authentication bypass vulnerability in multiple Fortinet products, actively exploited in the wild.| Cyber Security News
Fortinet temporarily disabled its FortiCloud Single Sign-On (SSO) service after confirming active exploitation of a zero-day authentication bypass vulnerability in multiple products.| Cyber Security News
Stanley browser malware shows fake sites while keeping real URLs, tricking users into stealing logins and financial data.| Cyber Security News
A huge unsecured database exposing 149 million stolen logins was discovered online, endangering users across major platforms.| Cyber Security News
A sophisticated "homoglyph" phishing campaign targeting customers of Marriott International and Microsoft. Attackers are registering domains that replace the letter "m" with the combination "rn" (r + n), creating fake websites that look nearly identical to the real ones.| Cyber Security News
Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations.| Cyber Security News
MacSync macOS malware targets crypto users, stealing data via social engineering that tricks victims into running Terminal commands.| Cyber Security News
The flaw, tracked as CVE-2026-23594, could allow a remote attacker with low-level access to gain full administrative control on affected systems.| Cyber Security News
Microsoft, in collaboration with U.S. and U.K. authorities, has announced a major international operation that dismantled RedVDS| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
The attack bypasses both password requirements and multi-factor authentication (MFA) protections, representing a dangerous evolution in cloud-focused threat tactics.| Cyber Security News
NATO Research Sectors - A recent investigation by Sekoia.io’s Threat Detection & Response (TDR) team has revealed a new wave of spear.| Cyber Security News
This shift in tactics, known as "Living Off the Land," poses a significant challenge for organizations trying to protect their systems.| Cyber Security News
The flaw, catalogued as CVE-2025-54057, affects all versions of SkyWalking up to and including 10.2.0, raising significant concerns for organizations that rely on this monitoring solution.| Cyber Security News
North Korean Cyber Actors - A new report from the Multilateral Sanctions Monitoring Team (MSMT) warns that North Korea has built.| Cyber Security News
Black Friday cyber attacks - Cybercriminals are intensifying their efforts during Black Friday 2025, capitalizing on the unprecedented growth| Cyber Security News
According to threat intelligence sources, the attackers exploited an unpatched zero-day vulnerability in Oracle E-Business Suite to gain initial access to the company's systems.| Cyber Security News
Reddit has announced plans to significantly restrict the Internet Archive's Wayback Machine from indexing its platform, citing concerns that AI companies have been exploiting the archival service to circumvent Reddit's data protection policies.| Cyber Security News
MixMode has been recognized by USA Today as one of the Top 10 AI Companies to Watch in 2024. This prestigious acknowledgment highlights MixMode’s vital contributions to cybersecurity and ability to shape the industry's future through advanced AI.| MixMode
Microsoft has rolled out a comprehensive set of security enhancements aimed at countering the surge in AiTM phishing attacks.| Cyber Security News
A critical security vulnerability in ChatGPT has been discovered that allows attackers to embed malicious SVG (Scalable Vector Graphics) and image files directly into shared conversations, potentially exposing users to sophisticated phishing attacks and harmful content.| Cyber Security News
Apple has released critical security updates for macOS Sequoia, addressing multiple vulnerabilities that could allow malicious applications to access sensitive user data.| Cyber Security News
Dell Technologies has issued a security advisory regarding multiple vulnerabilities in its RecoverPoint for Virtual Machines (RP4VM) software.| Cyber Security News
The directory, located at https://server.xcode.co.id/files/mimikatz/Win32/, has raised sconcerns about potential misuse by malicious actors.| Cyber Security News
The victims, all based in France, include Omydoo, Ayomi.fr, and ADULLACT, marking a significant escalation in their cyber extortion campaign.| Cyber Security News
The breach underscores persistent vulnerabilities in the nation’s cybersecurity infrastructure and raises pressing concerns about data protection.| Cyber Security News
In October 2023, Microsoft introduced native support for 11 additional compression formats in Windows 11 through the KB5031455 update.| Cyber Security News
This marks yet another chapter in the group's ongoing campaign of digital extortion and data breaches.| Cyber Security News
This incident underscores the growing threat of ransomware targeting architecture and engineering (A&E) firms.| Cyber Security News
Microsoft Entra ID has introduced a robust security mechanism called protected actions, aimed at preventing attackers from permanently deleting user accounts.| Cyber Security News
A critical vulnerability in SolarWinds' Web Help Desk (WHD) software has been identified, allowing remote, unauthenticated attackers to exploit hardcoded credentials embedded in the system.| Cyber Security News
The pursuit of single-bit fault injection attacks has long been regarded as a challenging frontier in hardware security.| Cyber Security News
A critical security vulnerability, identified as CVE-2025-1077, has been disclosed in IBL Software Engineering's Visual Weather software and its derived products.| Cyber Security News
The incident underscores the growing threat posed by this ransomware group, which has targeted various industries worldwide.| Cyber Security News
The EarlyCrow system introduces a groundbreaking approach to detecting Advanced Persistent Threat (APT) malware command and control (C&C) communications.| Cyber Security News
A new attack vector exploiting vulnerabilities in Kerberos delegation within Active Directory (AD) networks has been uncovered.| Cyber Security News