Category: Technology News
-
Malicious Firefox Browser Extensions Campaign Impersonate, Steal Crypto Wallets
Researchers at Koi Security, a cybersecurity company, have recently discovered a large-scale campaign involving dozens of fake Firefox browser extensions designed to steal cryptocurrency wallet credentials by impersonating popular wallet exchange tools. The campaign has been ongoing since at least April 2025, with new malicious extensions appearing as recently as last week. The persistent and…
-
T-Mobile Launches T-Satellite Service in Partnership With Starlink to Expand Connectivity
T-Mobile has opened access to its new satellite connectivity service, T-Satellite, developed in collaboration with Starlink. The service aims to provide coverage in remote areas where traditional cellular networks are unavailable. It leverages Starlink’s extensive satellite network, making it the largest of its kind globally, and is the first US-based mobile provider to operate a…
-
Recruiting Software Maker TalentHook Exposes 25M+ Resumes in Data Leak
In a recent discovery, Cybernews researchers have uncovered a massive data leak exposing nearly 26 million resumes stored by TalentHook, a cloud-based applicant tracking system widely used by HR departments to connect with job seekers. TalentHook is a platform facilitating recruitment processes for many organizations. A misconfigured Azure Blob storage container belonging to TalentHook left…
-
Avoid Amazon Scams and Phishing Attacks Appearing Around Prime Day
As Amazon Prime Day 2025 approaches on July 8th, shoppers worldwide are eagerly preparing their wish lists for the big savings event. But this busy shopping period also attracts hackers. Cybercriminals are actively deploying phishing attacks and creating fake domains designed to deceive consumers. Security researches at Check Point Research in a recent report found…
-
Cisco Talos Unconvers Brand Impersonation Phishing Attacks via PDF Files
As cyber threats continue to evolve, attackers are exploiting even the most trusted file formats for nefarious purposes. In its latest research, Cisco Talos Intelligence Group highlights how PDF files are increasingly being used as delivery mechanisms for brand impersonation and callback phishing campaigns. The findings stem from recent enhancements to Cisco’s brand impersonation detection…
-
Critical Remote Code Execution Vulnerability Discovered in WingFTP
Researchers at RCE Security have identified a severe security flaw affecting WingFTP, a popular cross-platform FTP server software. This vulnerability, designated as CVE-2025-47812, has been assigned a maximum CVSS score of 10, indicating its high severity. Successful exploitation could allow remote attackers to execute arbitrary code on affected systems, potentially leading to full system compromise.…
-
Critical Sudo Vulnerability in Linux Systems Enables Privilege Escalation via chroot Feature
The Stratascale Cyber Research Unit has recently identified a significant security flaw in the Linux sudo utility on a security report on their website. This vulnerability, tracked as CVE-2025-32463, allows unprivileged users to escalate their privileges to root by exploiting the chroot feature—used to restrict a process’s view of the filesystem—even if no sudo rules…
Categories:
Have any comments or suggestions? Feel free to let us know!