Cybersecurity News

Stay up-to-date with the latest cybersecurity news and developments in the cybersecurity landscape. Be the first to know about the latest threats, current innovations, and major trends in the cyber universe. Check our Cyber News section for the freshest information.

** Colorful collage of gears, robots, and tech icons against a blue background.

Critical Authentication Bypass Vulnerability Discovered in Palo Alto Networks Firewalls

CyberSecureFox 🦊

Cybersecurity researchers have detected widespread exploitation attempts targeting a newly discovered critical vulnerability (CVE-2025-0108) in Palo Alto Networks’ PAN-OS firewall ...

** Futuristic data server room with glowing ’X’ and code blocks.

X (Former Twitter) Implements Selective Blocking of Signal.me URLs: Security Analysis

CyberSecureFox 🦊

A significant development in digital communications security has emerged as X (formerly Twitter) implements new restrictions targeting Signal’s secure messaging ...

** An open book with gears and circuits emerging from it, set in a library.

Microsoft Patches Critical Zero-Day Privilege Escalation Vulnerability in Power Pages Platform

CyberSecureFox 🦊

Microsoft has released an emergency security update addressing a critical privilege escalation vulnerability (CVE-2025-24989) in its Power Pages platform. The ...

Digital shield icon emerging from a smartphone amid colorful geometric shapes.

Google Implements Critical Security Feature to Combat Phone-Based Social Engineering Attacks on Android

CyberSecureFox 🦊

Google has announced a groundbreaking security enhancement for its Android operating system, introducing a sophisticated protection mechanism that prevents critical ...

** Futuristic digital sphere secured by a lock, surrounded by glowing city-like structures.

Critical Authentication Bypass Vulnerability in SonicWall Firewalls Under Active Attack

CyberSecureFox 🦊

Cybersecurity researchers have detected active exploitation of a critical vulnerability (CVE-2024-53704) affecting SonicWall firewall devices. The flaw enables threat actors ...

North Korean Hackers Launch Sophisticated Supply Chain Attacks with Novel Marstech1 Malware

North Korean Hackers Launch Sophisticated Supply Chain Attacks with Novel Marstech1 Malware

CyberSecureFox 🦊

SecurityScorecard researchers have uncovered a significant cyber espionage campaign dubbed “Marstech Mayhem,” orchestrated by North Korea’s notorious Lazarus Group. The ...

** Cartoon character with gears and tech elements, surrounded by colorful clouds and icons.

Critical Alert: New Device Authorization Code Attack Threatens Microsoft 365 Enterprise Security

CyberSecureFox 🦊

Microsoft’s Threat Intelligence team has identified a sophisticated phishing campaign orchestrated by the threat actor group Storm-2372, targeting enterprise Microsoft ...

** A modern printer emits papers, surrounded by a glowing shield icon and colorful smoke.

Xerox VersaLink Devices Found Vulnerable to Credential Theft Through LDAP and SMB/FTP Attacks

CyberSecureFox 🦊

Cybersecurity researchers at Rapid7 have uncovered two significant security vulnerabilities in Xerox VersaLink enterprise multifunction devices that could enable malicious ...

** Illustration of a grinning figure in a red hood surrounded by colorful tech icons and a sad cloud.

Major Data Leak Leads to Downfall of Black Basta Ransomware Operation

CyberSecureFox 🦊

A significant data breach in February 2025 has led to the effective dissolution of Black Basta, one of the most ...

** A hooded figure crouches with a rifle, surrounded by high-tech data displays and a glowing globe in a dark environment.

Cybersecurity Researchers Uncover Sophisticated Unicode-Based Malware Obfuscation Method

CyberSecureFox 🦊

Juniper Threat Labs researchers have discovered an advanced malware concealment technique that leverages invisible Unicode characters to orchestrate sophisticated phishing ...