MS Warns Over ClickFix Phishing Scam

Microsoft has alerted users to a rising “ClickFix” phishing campaign that tricks people into believing they need to resolve pressing security issues. Cybercriminals send seemingly urgent emails—posing as Microsoft notifications—that direct recipients to malicious websites or disguised links. Once users click, attackers harvest login credentials or inject malware into target systems. Microsoft stresses the importance […]

Read More

Cyber-criminals Exploit CSS to Bypass Detection

According to the reported findings, cyber-criminals are increasingly manipulating Cascading Style Sheets (CSS) to help their malware evade detection. By embedding malicious code within CSS files, attackers can stealthily deliver payloads, circumventing traditional security tools that focus on more common threat vectors like JavaScript or executable files. Security researchers warn that this tactic highlights a […]

Read More

Apache Tomcat Vulnerability Draws Serious Security Concerns

A recently disclosed flaw in Apache Tomcat, a popular Java-based web server and servlet engine, has prompted urgent warnings from cybersecurity experts. According to the latest reports, attackers could exploit the vulnerability to run malicious code or escalate privileges within compromised systems, putting countless web services and applications at risk. Apache Tomcat powers a significant […]

Read More

Hackers Exploit PowerShell for Stealth Attacks

North Korean Hackers Exploit PowerShell for Stealth Attacks A recent report highlights that North Korean state-sponsored hackers are exploiting PowerShell-based scripts to infiltrate targeted systems worldwide. According to security researchers, the attackers rely on sophisticated social engineering tactics and cleverly disguised payloads to bypass traditional detection methods. Once inside a network, they move laterally, extract […]

Read More

MS Feb 25 Patch

Microsoft’s February 2025 Patch Tuesday addresses a total of 63 security flaws across various products, including two zero-day vulnerabilities under active exploitation. These zero-day bugs reportedly allow attackers to escalate privileges on Windows systems without user interaction. The updates cover an extensive range of Microsoft software, from Windows OS components and Exchange Server to developer […]

Read More

Palo Alto Patches Auth Bypass

Palo Alto Networks has released a new set of security patches addressing several vulnerabilities within its PAN-OS operating system, the backbone of its next-generation firewalls. These flaws range in severity but include at least one critical issue that could allow remote threat actors to gain unauthorised access or execute arbitrary code. According to initial advisories, […]

Read More

AI-Powered Social Engineering

In this article, security researchers highlight how artificial intelligence (AI) is evolving social engineering tactics to an unprecedented level of sophistication. Using advanced algorithms, cybercriminals can quickly gather personal data, generate highly convincing messages, and personalise attacks to trick individuals and businesses. The article stresses the importance of proactive security measures, educating users about AI-based […]

Read More

WhoAmI Attack Exploits

New ‘WhoAmI’ Attack Targets AWS AMI Naming to Slip Malicious Images Into Cloud Deployments Introduction A recently discovered cybersecurity threat, referred to as the WhoAmI attack, is taking aim at Amazon Web Services (AWS). By manipulating the naming of Amazon Machine Images (AMIs), attackers can introduce harmful images into AWS instances. This tactic allows them […]

Read More

PostgreSQL Vulnerability

Article Summary A newly discovered vulnerability in PostgreSQL has attracted attention from both security researchers and cybercriminals. Attackers have reportedly exploited this flaw to gain unauthorised access, potentially placing sensitive information at risk. The vulnerability allows malicious users to manipulate database queries and, in some cases, even escalate privileges. PostgreSQL maintainers have issued patches, emphasising […]

Read More