Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
https://cybersecuritynews.com/konfety-android-malware-on-google-play/
https://cybersecuritynews.com/konfety-android-malware-on-google-play/
Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
Sophisticated Android malware variant exploits ZIP-level manipulation and dynamic code loading to evade detection while conducting ad fraud operations targeting mobile users globally.
Android malware Konfety uses malformed APKs to evade detection
https://www.bleepingcomputer.com/news/security/android-malware-konfety-uses-malformed-apks-to-evade-detection/
https://www.bleepingcomputer.com/news/security/android-malware-konfety-uses-malformed-apks-to-evade-detection/
BleepingComputer
Android malware Konfety uses malformed APKs to evade detection
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection.
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
https://www.thezdi.com/blog/2025/7/14/cve-2025-4919-corruption-via-math-space-in-mozilla-firefox
https://www.thezdi.com/blog/2025/7/14/cve-2025-4919-corruption-via-math-space-in-mozilla-firefox
Zero Day Initiative
Zero Day Initiative — CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
In recent years, there has been an increase interest in the JavaScript engine vulnerabilities in order to compromise web browsers. Notably, vulnerabilities in JIT engines are among the most favorite ones as it provides strong primitives and well-known techniques…
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
https://cybersecuritynews.com/threat-actors-mimic-websites-to-promote-investment-scams/
https://cybersecuritynews.com/threat-actors-mimic-websites-to-promote-investment-scams/
Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
Fake CNN, BBC, and ABC sites used in global scam campaign pushing “passive income” via Google & Facebook ads with celebrity bait tactics.
Ransomware Attack on Albemarle County Exposes Residents’ Personal Information
https://gbhackers.com/ransomware-attack-on-albemarle-county/
https://gbhackers.com/ransomware-attack-on-albemarle-county/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Ransomware Attack on Albemarle County Exposes Residents’ Personal Information
Albemarle County, Virginia, discovered irregularities in its IT infrastructure under a sophisticated ransomware attack.
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
https://securityaffairs.com/179969/malware/android-malware-konfety-evolves-with-zip-manipulation-and-dynamic-loading.html
https://securityaffairs.com/179969/malware/android-malware-konfety-evolves-with-zip-manipulation-and-dynamic-loading.html
Security Affairs
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
A new Konfety Android malware variant uses a malformed ZIP and obfuscation to evade detection, posing as fake apps with no real functionality.
What you need to know about CVSS to protect your IT assets
https://www.kaspersky.com/blog/cvss-4-base-evolution/53825/
https://www.kaspersky.com/blog/cvss-4-base-evolution/53825/
Kaspersky
What you need to know about CVSS to protect your IT assets
The CVSS base metrics from version 1.0 through 4.0. How to read CVSS scores, and why you shouldn't stop at the Base Score
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks
https://cybersecuritynews.com/ncsc-urges-organizations-to-upgrade-microsoft-windows-11/
https://cybersecuritynews.com/ncsc-urges-organizations-to-upgrade-microsoft-windows-11/
Cyber Security News
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks
UK's NCSC urges urgent Windows 11 upgrade as Windows 10 hits end-of-life on Oct 14, 2025—citing major security risks like WannaCry.
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
https://cybersecuritynews.com/apache-tomcat-coyote-vulnerability/
https://cybersecuritynews.com/apache-tomcat-coyote-vulnerability/
Cyber Security News
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
Apache Tomcat vulnerability lets attackers exhaust threads via HTTP/2, causing DoS without affecting data confidentiality or integrity.
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
https://cybersecuritynews.com/north-korean-hackers-using-fake-zoom-invites/
https://cybersecuritynews.com/north-korean-hackers-using-fake-zoom-invites/
Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
North Korean hackers target crypto startups via fake Zoom interviews, using evolved malware and job lures.
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems
https://cybersecuritynews.com/ransomware-gangs-actively-expanding-to-attack-vmware-and-linux-systems/
https://cybersecuritynews.com/ransomware-gangs-actively-expanding-to-attack-vmware-and-linux-systems/
Cyber Security News
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems
Ransomware gangs now target Linux & VMware, shifting from Windows to exploit cloud & virtualization gaps in enterprise security defenses.
Google Chrome 0-day Vulnerability Actively Exploited in the Wild
https://cybersecuritynews.com/chrome-0-day-vulnerability-exploited-wild/
https://cybersecuritynews.com/chrome-0-day-vulnerability-exploited-wild/
Cyber Security News
Google Chrome 0-day Vulnerability Actively Exploited in the Wild
Google has released an emergency security update for Chrome, addressing a critical zero-day vulnerability that attackers are actively exploiting in real-world attacks.
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data
https://cybersecuritynews.com/hacktivist-groups-attacks-on-critical-ics-systems/
https://cybersecuritynews.com/hacktivist-groups-attacks-on-critical-ics-systems/
Cyber Security News
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data
Hacktivists now target critical infrastructure via ICS attacks, which rose to 31% in Q2 2025, marking a sharp shift from DDoS.
BaitTrap – 17,000+ Fake News Websites Caught Promoting Investment Frauds
https://cybersecuritynews.com/baittrap-17000-fake-news-websites-caught/
https://cybersecuritynews.com/baittrap-17000-fake-news-websites-caught/
Cyber Security News
BaitTrap – 17,000+ Fake News Websites Caught Promoting Investment Frauds
Over 17,000 fake news sites in 50 countries use ads, fake headlines, and public figures to push crypto scams in a global BaitTrap campaign.
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware
https://cybersecuritynews.com/north-korean-hackers-weaponized-67-malicious-npm-packages/
https://cybersecuritynews.com/north-korean-hackers-weaponized-67-malicious-npm-packages/
Cyber Security News
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware
North Korean hackers planted 67 malicious npm packages with 17K+ downloads, using new XORIndex malware in an evolving supply chain attack.
Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders
https://cybersecuritynews.com/octalyn-stealer-steals-vpn-configurations/
https://cybersecuritynews.com/octalyn-stealer-steals-vpn-configurations/
Cyber Security News
Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders
Octalyn Stealer on GitHub poses as a forensic tool, stealing VPN, browser, and crypto data via stealthy C++/Delphi malware builder.
VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host
https://cybersecuritynews.com/vmware-esxi-and-workstation-vulnerabilities/
https://cybersecuritynews.com/vmware-esxi-and-workstation-vulnerabilities/
Cyber Security News
VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host
Multiple severe vulnerabilities have been addressed affecting VMware ESXi, Workstation, Fusion, and Tools that could allow attackers to execute malicious code on host systems.
NCSC Expands Vulnerability Research to Tackle Evolving Cyber Threats
https://thecyberexpress.com/ncsc-vulnerability-research/
https://thecyberexpress.com/ncsc-vulnerability-research/
The Cyber Express
NCSC Vulnerability Research Enhances UK Cyber Resilience
Here’s how NCSC vulnerability research and the VRI strengthen UK cybersecurity through collaboration with experts, and the UK government.
Police disrupt “Diskstation” ransomware gang attacking NAS devices
https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/
https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/
BleepingComputer
Police disrupt “Diskstation” ransomware gang attacking NAS devices
An international law enforcement action dismantled a Romanian ransomware gang known as 'Diskstation,' which encrypted the systems of several companies in the Lombardy region, paralyzing their businesses.
North Korean XORIndex malware hidden in 67 malicious npm packages
https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/
https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/
BleepingComputer
North Korean XORIndex malware hidden in 67 malicious npm packages
North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new malware loader called XORIndex to developer systems.
Microsoft Fixed 130+ Flaws With July Patch Tuesday
https://latesthackingnews.com/2025/07/15/microsoft-fixed-130-flaws-with-july-patch-tuesday/
https://latesthackingnews.com/2025/07/15/microsoft-fixed-130-flaws-with-july-patch-tuesday/
LHN
Microsoft Fixed 130+ Flaws With July Patch Tuesday
Microsoft has rolled out the Patch Tuesday updates for July 2025, ensuring the updates. This month’s update bundle is rather huge, addressing 137 different vulnerabilities across different products. Users with eligible devices should ensure keeping