Latest Cybersecurity News and Articles


Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

07 August 2025
Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could allow an attacker to gain elevated privileges under certain conditions. The vulnerability, tracked as CVE-2025-53786, carries a CVSS score of 8.0. Dirk-jan Mollema with Outsider Security has been acknowledged for reporting the bug. "In an Exchange hybrid deployment, an

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

07 August 2025
Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks. "The attack results in pre-authentication remote code execution on Axis Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to view

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

07 August 2025
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both a weapon and a shield. As AI rapidly changes how enterprises innovate, security teams are now tasked with a triple burden: Secure AI embedded in every part of the business. Use AI to defend faster and smarter. Fight AI-powered threats that execute in minutes—or seconds. Security

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

07 August 2025
SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse. "We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability," the company said. "Instead, there is a significant correlation with threat activity related to CVE-2024-40766."

New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites

07 August 2025
A desync attack method leveraging HTTP/1.1 vulnerabilities impacted many websites and earned researchers more than $200,000 in bug bounties. The post New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites appeared first on SecurityWeek.

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

07 August 2025
Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write. But in 2025, that trust comes with a serious risk. Every few weeks, we’re seeing fresh headlines about malicious packages uploaded to the Python Package Index (PyPI)—many going undetected until after they’ve caused

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

06 August 2025
Zenity has shown how AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially crafted prompts. The post Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation appeared first on SecurityWeek.

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

06 August 2025
CyberArk has patched several vulnerabilities that could be chained for unauthenticated remote code execution. The post Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities appeared first on SecurityWeek.

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

06 August 2025
Cybersecurity researchers have demonstrated an "end-to-end privilege escalation chain" in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lateral movement, access sensitive data, and seize control of the cloud environment. The attack technique has been codenamed ECScape by Sweet Security researcher Naor Haziz, who presented the findings today at the

Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

06 August 2025
The malicious ad tech purveyor known as VexTrio Viper has been observed developing several malicious apps that have been published on Apple and Google's official app storefronts under the guise of seemingly useful applications. These apps masquerade as VPNs, device "monitoring" apps, RAM cleaners, dating services, and spam blockers, DNS threat intelligence firm Infoblox said in an exhaustive

Google Discloses Salesforce Hack 

06 August 2025
A Google Salesforce instance may have been targeted as part of a ShinyHunters campaign that hit several major companies.  The post Google Discloses Salesforce Hack  appeared first on SecurityWeek.

PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins

06 August 2025
Splunk researchers developed a system to fingerprint post-logon behavior, using AI to find subtle signals of intrusion. The post PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins appeared first on SecurityWeek.

WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says

06 August 2025
Meta linked these scams to a criminal scam center in Cambodia — and said it disrupted the campaign in partnership with ChatGPT maker OpenAI. The post WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says appeared first on SecurityWeek.

Trend Micro Patches Apex One Vulnerabilities Exploited in Wild

06 August 2025
Trend Micro has rushed to fix two Apex One zero-days that may have been exploited by Chinese threat actors. The post Trend Micro Patches Apex One Vulnerabilities Exploited in Wild appeared first on SecurityWeek.

Microsoft Paid Out $17 Million in Bug Bounties in Past Year

06 August 2025
Microsoft handed out $17 million in rewards to 344 security researchers through its bug bounty programs over the past year. The post Microsoft Paid Out $17 Million in Bug Bounties in Past Year appeared first on SecurityWeek.

Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities

06 August 2025
An AI extension to the Ox Security platform automatically generates organization specific code to fix vulnerabilities in the codebase. The post Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities appeared first on SecurityWeek.

Over 1 Million Impacted by DaVita Data Breach

06 August 2025
DaVita has notified over 1 million individuals that their personal and health information was stolen in a ransomware attack. The post Over 1 Million Impacted by DaVita Data Breach appeared first on SecurityWeek.

Who Got Arrested in the Raid on the XSS Crime Forum?

06 August 2025
On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a 38-year-old administrator of XSS, a Russian-language cybercrime forum with more than 50,000 members. The action has triggered an ongoing frenzy of speculation and panic among XSS denizens about the identity of the unnamed suspect, but the consensus is that he is a pivotal figure in the crime forum scene who goes by the hacker handle "Toha." Here's a deep dive on what's knowable about Toha, and a short stab at who got nabbed.

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

06 August 2025
ReVault vulnerabilities in the ControlVault3 firmware in Dell laptops could lead to firmware modifications or Windows login bypass. The post Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass appeared first on SecurityWeek.

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

06 August 2025
As the volume and sophistication of cyber threats and risks grow, cybersecurity has become mission-critical for businesses of all sizes. To address this shift, SMBs have been urgently turning to vCISO services to keep up with escalating threats and compliance demands. A recent report by Cynomi has found that a full 79% of MSPs and MSSPs see high demand for vCISO services among SMBs. How are