Tuesday, June 10, 2025

Cyber Security News

Windows WebDAV 0-Day

Microsoft Windows WebDAV 0-Day RCE Vulnerability Actively Exploited in The Wild

0
A critical zero-day vulnerability in Microsoft Windows, designated CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group Stealth Falcon. The flaw, enabling...
Microsoft Patch Tuesday June 2025

Microsoft Patch Tuesday June 2025 – 66 Vulnerabilities Patched Including 2 Zero-Day

0
Microsoft has released its June 2025 Patch Tuesday security updates, addressing a total of 66 vulnerabilities across its software ecosystem. This month’s updates include...
Automation Systems

New Report Highlights the Internet as the Primary Threat to Industrial Automation Systems

0
A recent report by Kaspersky ICS CERT, released on June 10, 2025, sheds light on the persistent and evolving cyberthreats targeting industrial automation systems...
ESET

ESET Details on How to Manage Your Digital Footprint

0
ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital footprints the data trails left by users during online interactions. As...
SAP NetWeaver

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges

0
A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed under SAP Security Note #3600840, carrying a near-maximum CVSS score...
Instagram Growth Tools

Beware of Instagram Growth Tools Stealing Login Credentials and Sending Them to Attackers

0
A discovery by Socket's Threat Research Team has unveiled a malicious Python package named imad213, masquerading as an Instagram growth tool. Created by a threat...
North Korean APT Hacker

North Korean APT Hackers Target Users on Social Media to Spread Malware

0
The Genians Security Center (GSC) has uncovered a highly sophisticated Advanced Persistent Threat (APT) campaign orchestrated by the North Korean state-sponsored hacking group Kimsuky. Active...
SIEM as a Service

Recent News

Wireshark Certified Analyst

Wireshark Certified Analyst – Wireshark Released Official Certification for Security Professionals

0
The Wireshark Foundation has officially launched the Wireshark Certified Analyst (WCA-101) certification, marking a significant milestone for IT professionals and network engineers worldwide. Designed...

VMware NSX XSS Vulnerability Exposes Systems to Malicious Code Injection

0
Broadcom has issued a high-severity security advisory (VMSA-2025-0012) for VMware NSX, addressing three newly discovered stored Cross-Site Scripting (XSS) vulnerabilities: CVE-2025-22243, CVE-2025-22244, and CVE-2025-22245....

Critical FreeRTOS-Plus-TCP Flaw Allows Code Execution or System Crash

0
A critical memory corruption vulnerability, tracked as CVE-2025-5688, has been disclosed in FreeRTOS-Plus-TCP, Amazon’s open-source TCP/IP stack widely used in embedded and IoT devices....
Play Ransomware

CISA Releases TTPs & IoCs for Play Ransomware That Hacked 900+ Orgs

0
The Cybersecurity and Infrastructure Security Agency (CISA), alongside the Federal Bureau of Investigation (FBI) and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s...
Malicious Links

Hackers Exploit New HTML Trick to Deceive Outlook Users into Clicking Malicious Links

0
Cybersecurity researchers have encountered a cleverly crafted phishing email targeting Czech bank customers, employing a lesser-known but highly deceptive technique to bypass security mechanisms...

New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques

0
Security analysts at CyberProof’s Security Operations Center (SOC) have identified a sharp rise in phishing campaigns leveraging Microsoft SharePoint to bypass modern detection systems. Unlike...
npm Utility Packages

Malicious npm Utility Packages Enable Attackers to Wipe Production Systems

0
Socket's Threat Research Team has uncovered two malicious npm packages, express-api-sync and system-health-sync-api, designed to masquerade as legitimate utilities while embedding destructive backdoors capable...

ANY.RUN Empowers Government Agencies with Real-Time Threat Detection

0
Government agencies worldwide are facing an unprecedented wave of cyberattacks, with adversaries employing advanced tactics to breach critical infrastructure and steal sensitive data. Recent...
pathWiper Malware

New pathWiper Malware Targets Critical Infrastructure to Deploy Admin Tools

0
Cisco Talos has uncovered a sophisticated and destructive cyberattack targeting a critical infrastructure entity in Ukraine, deploying a previously unknown wiper malware dubbed "PathWiper."...

Microsoft Windows WebDAV 0-Day RCE Vulnerability Actively Exploited in The Wild

A critical zero-day vulnerability in Microsoft Windows, designated CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group Stealth Falcon. The flaw, enabling...

Microsoft Patch Tuesday June 2025 – 66 Vulnerabilities Patched Including 2 Zero-Day

Microsoft has released its June 2025 Patch Tuesday security updates, addressing a total of 66 vulnerabilities across its software ecosystem. This month’s updates include...

New Report Highlights the Internet as the Primary Threat to Industrial Automation Systems

A recent report by Kaspersky ICS CERT, released on June 10, 2025, sheds light on the persistent and evolving cyberthreats targeting industrial automation systems...

ESET Details on How to Manage Your Digital Footprint

ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital footprints the data trails left by users during online interactions. As...

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges

A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed under SAP Security Note #3600840, carrying a near-maximum CVSS score...

Beware of Instagram Growth Tools Stealing Login Credentials and Sending Them to Attackers

A discovery by Socket's Threat Research Team has unveiled a malicious Python package named imad213, masquerading as an Instagram growth tool. Created by a threat...

North Korean APT Hackers Target Users on Social Media to Spread Malware

The Genians Security Center (GSC) has uncovered a highly sophisticated Advanced Persistent Threat (APT) campaign orchestrated by the North Korean state-sponsored hacking group Kimsuky. Active...

Ivanti Workspace Control Vulnerability Lets Attackers Remotely Exploit To Steal the Credential

Ivanti has released a critical security update for its Workspace Control software, patching three high-severity vulnerabilities that could allow attackers to compromise sensitive credentials....

Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks

SAP has released nineteen security patches in its June Patch Day, addressing critical vulnerabilities that could allow attackers to bypass authorization controls and escalate...

Glossary