Archives: News

News articles and updates

Daemon Tools Supply - Daemon Tools Supply Chain Attack Compromises Official Installers With Malware
Technology, networking, cybersecurity, AI

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A supply chain attack has tainted official installers for DAEMON Tools software, delivering malware to users who downloaded from the company’s legitimate website. Security firm Kaspersky identified the compromise, noting that the affected installers carry digital signatures from DAEMON Tools developers. This incident exposes users to risks from trusted sources, with no confirmed number of...

Alex Harrison 2 min read
Yet Another Way - Yet Another Way To Bypass Google Chrome'S Encryption Protection
Technology, networking, cybersecurity, AI

Yet Another Way to Bypass Google Chrome's Encryption Protection

Developers behind the VoidStealer Trojan discovered a method to circumvent Google Chrome’s App-Bound Encryption feature on May 6, 2026. This technique allows the malware to access encrypted data stored in the browser, exposing sensitive user information to theft. The finding came from analysis shared by cybersecurity researchers tracking infostealer campaigns. Bypass Method Details The VoidStealer...

osama ahmed 2 min read
Attacks Abuse Windows - Attacks Abuse Windows Phone Link To Steal Texts &Amp;Amp; Bypass 2Fa
Technology, networking, cybersecurity, AI

Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

Hackers have targeted Windows users through Microsoft Phone Link, a tool that connects PCs to Android smartphones. Attackers deploy CloudZ RAT malware along with a new Pheno plug-in to access text messages and one-time passwords (OTPs). These actions allow bypassing two-factor authentication (2FA) in stealthy operations detected recently. Enterprises face the highest risks as attackers...

Muhammad Khattak 2 min read
Middle East Cyber - Middle East Cyber Battle Field Broadens — Especially In Uae
Technology, networking, cybersecurity, AI

Middle East Cyber Battle Field Broadens — Especially in UAE

The United Arab Emirates has become a primary target in an expanding cyber conflict in the Middle East, with breach attempts tripling in recent weeks. Critical infrastructure sectors, including energy and transportation, report the highest volume of incidents amid the ongoing war with Iran. Officials confirmed the sharp increase on May 6, 2026, based on...

Mudassir K 2 min read
Research Hub Bridges - Research Hub Bridges Cybersecurity Gap For Under-Resourced Organizations
Technology, networking, cybersecurity, AI

Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) provides tools and support to schools, local governments, and non-profits. These organizations face a rising number of cyberattacks. Under-resourced groups often lack resources to protect their systems. CLTC steps in to help them build defenses against these threats. What Happened Cyberattacks on small organizations have increased in...

Asad Ijaz 3 min read
Autonomous Offensive Security - Autonomous Offensive Security Firm Xbow Raises $35 Million
Technology, networking, cybersecurity, AI

Autonomous Offensive Security Firm XBOW Raises $35 Million

XBOW, a firm focused on autonomous offensive security, raised $35 million. The funding serves as an extension to its prior Series C round. This capital infusion supports the company’s efforts in developing systems for automated security testing and offensive operations. The announcement appeared on SecurityWeek, confirming the raise occurred before May 7, 2026. XBOW operates...

Muhammad Anwar 2 min read
Ivanti Epmm Cve-2026-6973 - Ivanti Epmm Cve-2026-6973 Rce Under Active Exploitation Grants Admin-Level Access
Technology, networking, cybersecurity, AI

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti Endpoint Manager Mobile (EPMM) users face risks from limited real-world attacks exploiting a high-severity vulnerability. The issue, tracked as CVE-2026-6973, enables remote code execution and grants administrative access to affected systems. Ivanti confirmed the flaw’s exploitation on May 6, 2026, urging immediate patching. What Happened Ivanti detected the vulnerability in EPMM versions prior to...

Jenney Heather 2 min read
The Back Door - The Back Door Attackers Know About — And Most Security Teams Still Haven’t Closed
Technology, networking, cybersecurity, AI

The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

NetworkUstad — Security researchers report that a common server configuration leaves organizations open to backdoor attacks, with many teams failing to address the issue despite known risks as of May 6, 2026. Experts point to misconfigured administrative interfaces on web servers as the primary vulnerability. Attackers scan for exposed management portals, such as default admin...

Riya Khan 2 min read
Scarcruft Hacks Gaming Platform To Deploy Birdcall Malware On Android And Windows
Technology, networking, cybersecurity, AI

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

ScarCruft, a North Korean hacking group, has compromised a gaming platform to distribute BirdCall malware targeting Android and Windows devices. Security researchers detected the operation, which uses the platform to deliver the payload through malicious updates and downloads. Attack Details The hackers breached the gaming platform’s servers, injecting malicious code into legitimate apps and update...

Ahmad Farooq 2 min read
Weaver E-Cology Rce Flaw Cve-2026-22679 Actively Exploited Via Debug Api
Technology, networking, cybersecurity, AI

Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

Security researchers have confirmed active exploitation of a remote code execution vulnerability in Weaver E-cology software, tracked as CVE-2026-22679. Attackers are targeting the product’s debug API, allowing unauthorized code execution on affected systems as of early May 2026. Vulnerability Details The flaw resides in the debug API of Weaver E-cology, an enterprise application used for...

Omar Nawaz 2 min read