• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - software vulnerability
Tag:

software vulnerability

Tech

Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

by Chief Editor January 22, 2026
written by Chief Editor

Cisco Zero-Days: A Harbinger of Increased Attacks on Collaboration Tools?

The recent disclosure of CVE-2026-20045, a critical zero-day vulnerability impacting Cisco’s Unified Communications and Webex Calling platforms, isn’t an isolated incident. It’s a stark reminder of a growing trend: collaboration tools are rapidly becoming prime targets for malicious actors. This vulnerability, already exploited in the wild, allows unauthenticated remote code execution – a worst-case scenario for any organization. The speed with which the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added this to its Known Exploited Vulnerabilities (KEV) catalog, mandating fixes for federal agencies, underscores the severity of the threat.

The Expanding Attack Surface of Unified Communications

For years, network infrastructure devices like routers and firewalls received the bulk of security attention. However, the shift towards hybrid and remote work has dramatically expanded the attack surface. Unified Communications (UC) systems – encompassing voice, video conferencing, messaging, and collaboration platforms – are now critical to business operations, and therefore, incredibly attractive to attackers. These systems often handle sensitive data and provide access points to internal networks.

The complexity of modern UC deployments also contributes to the risk. Integrating various applications and services creates multiple potential entry points for attackers. A 2024 report by Verizon’s DBIR showed a 60% increase in breaches involving collaboration tools compared to the previous year, highlighting this escalating threat.

Zero-Day Exploitation: A Rising Tide

The fact that CVE-2026-20045 was actively exploited as a zero-day – meaning before a patch was available – is particularly concerning. Zero-day exploits are notoriously difficult to defend against, as organizations have no prior warning. The increasing sophistication of threat actors, coupled with the growing market for zero-day vulnerabilities, suggests this trend will continue. We’ve already seen this play out with the recent critical vulnerability in Cisco Secure Email Gateway (CVE-2025-20393), demonstrating a pattern of targeting Cisco products.

Pro Tip: Implement a robust vulnerability management program that includes continuous monitoring for new threats and rapid patching capabilities. Prioritize vulnerabilities based on their severity and potential impact.

Beyond Cisco: A Broader Industry Challenge

While Cisco is currently in the spotlight, the vulnerability isn’t unique to their products. Similar vulnerabilities have been discovered in other leading UC platforms, including Microsoft Teams, Zoom, and Slack. This suggests a systemic issue within the industry – a need for more secure-by-design development practices and rigorous security testing.

The rise of supply chain attacks further complicates the situation. UC platforms often rely on third-party components and integrations, which can introduce vulnerabilities. Organizations need to carefully assess the security posture of their vendors and ensure they have adequate security controls in place.

The Role of AI in Both Attack and Defense

Artificial intelligence (AI) is playing an increasingly significant role in cybersecurity, both for attackers and defenders. Attackers are using AI to automate vulnerability discovery, craft more sophisticated phishing attacks, and evade detection. Conversely, AI-powered security tools can help organizations detect and respond to threats more quickly and effectively.

Did you know? AI-powered threat intelligence platforms can analyze vast amounts of data to identify emerging threats and predict future attacks.

Future Trends: What to Expect

Several key trends are likely to shape the future of UC security:

  • Increased Focus on Zero Trust: Adopting a Zero Trust architecture, which assumes no user or device is trusted by default, will be crucial for securing UC environments.
  • Enhanced Endpoint Security: Protecting endpoints – laptops, smartphones, and other devices used to access UC platforms – will become even more important.
  • AI-Driven Security Automation: Organizations will increasingly rely on AI-powered tools to automate security tasks, such as threat detection, incident response, and vulnerability management.
  • Secure SD-WAN Integration: As more organizations adopt Secure SD-WAN, integrating UC security with SD-WAN infrastructure will be essential.
  • Greater Regulatory Scrutiny: Governments are likely to increase regulatory scrutiny of UC security, particularly in industries that handle sensitive data.

FAQ

Q: What is a zero-day vulnerability?
A: A zero-day vulnerability is a software flaw that is unknown to the vendor and for which no patch is available. This makes it particularly dangerous, as attackers can exploit it before defenses can be put in place.

Q: What is CISA’s KEV catalog?
A: The KEV catalog lists vulnerabilities that have been actively exploited in the wild. Federal agencies are required to patch these vulnerabilities within a specified timeframe.

Q: How can I protect my organization from UC vulnerabilities?
A: Implement a robust vulnerability management program, adopt a Zero Trust architecture, enhance endpoint security, and stay informed about the latest threats.

Q: What is the CVSS score?
A: The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities. A higher score indicates a more critical vulnerability.

To stay ahead of evolving threats, regularly review your security posture, prioritize patching, and invest in advanced security solutions. Explore our other articles on cybersecurity best practices and threat intelligence to learn more about protecting your organization.

January 22, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

by Chief Editor January 8, 2026
written by Chief Editor

The Rise of AI Health Companions: Beyond ChatGPT Health

OpenAI’s launch of ChatGPT Health marks a pivotal moment, but it’s just the beginning. The integration of artificial intelligence into personal healthcare is rapidly accelerating, driven by user demand for accessible information and proactive health management. This isn’t simply about chatbots answering medical questions; it’s about creating personalized, preventative health ecosystems.

The Data-Driven Future of Personalized Health

ChatGPT Health’s ability to connect with apps like Apple Health, MyFitnessPal, and Peloton is a key indicator of where things are headed. The real power lies in the aggregation and analysis of this data. Imagine an AI not just telling you to exercise more, but suggesting a specific Peloton class based on your recent sleep data from Apple Health, your dietary intake from MyFitnessPal, and even factoring in local air quality to optimize your outdoor workout. This level of granular personalization was science fiction just a few years ago.

According to a recent report by Grand View Research, the global AI in healthcare market is projected to reach $187.95 billion by 2030, growing at a CAGR of 38.4% from 2023. This explosive growth is fueled by increasing volumes of health data, advancements in machine learning, and a growing need to address healthcare costs and accessibility.

Addressing the Risks: Privacy, Accuracy, and the Human Touch

The recent scrutiny surrounding AI-generated health information – highlighted by The Guardian’s investigation into Google AI Overviews and tragic cases of individuals receiving harmful advice from chatbots – underscores the critical need for robust safeguards. OpenAI’s emphasis on data isolation, encryption, and non-use of health data for model training are crucial steps. However, these measures must be continuously refined.

The lawsuits facing OpenAI and Character.AI serve as stark reminders that AI is not a substitute for human medical professionals. AI should augment, not replace, the doctor-patient relationship. The HealthBench benchmark, developed by OpenAI, is a positive step towards evaluating AI’s clinical accuracy, but independent validation and ongoing monitoring are essential.

Did you know? A study published in the Journal of the American Medical Informatics Association found that AI-powered diagnostic tools can achieve accuracy rates comparable to human doctors in certain specialties, but often struggle with rare or complex cases.

Beyond Chatbots: Emerging Trends in AI Healthcare

The future of AI in healthcare extends far beyond conversational interfaces. Here are some key trends to watch:

  • AI-Powered Diagnostics: AI algorithms are being used to analyze medical images (X-rays, MRIs, CT scans) with increasing accuracy, aiding in early detection of diseases like cancer and Alzheimer’s.
  • Drug Discovery and Development: AI is accelerating the drug discovery process by identifying potential drug candidates, predicting their efficacy, and optimizing clinical trial design.
  • Remote Patient Monitoring: Wearable sensors and AI-powered platforms are enabling continuous monitoring of patients’ vital signs and health data, allowing for proactive intervention and personalized care.
  • Mental Health Support: AI chatbots and virtual therapists are providing accessible and affordable mental health support, particularly for individuals in underserved communities.
  • Predictive Analytics for Public Health: AI is being used to predict disease outbreaks, identify at-risk populations, and optimize resource allocation for public health initiatives.

The Role of Regulation and Ethical Considerations

As AI becomes more deeply integrated into healthcare, robust regulatory frameworks are needed to ensure patient safety, data privacy, and algorithmic fairness. The FDA is actively developing guidelines for the approval of AI-powered medical devices, but a comprehensive and adaptable regulatory approach is crucial.

Ethical considerations, such as bias in algorithms and the potential for job displacement, must also be addressed proactively. Transparency, accountability, and human oversight are essential to building trust in AI-powered healthcare solutions.

Pro Tip: When using AI health tools, always verify information with a qualified healthcare professional. AI should be seen as a supplement to, not a replacement for, traditional medical care.

The Expanding Ecosystem: Competition and Collaboration

OpenAI isn’t alone in this space. Google, Microsoft, and numerous startups are investing heavily in AI healthcare solutions. We’re likely to see increased competition, leading to innovation and lower costs. However, collaboration between AI developers, healthcare providers, and regulatory agencies will be essential to realizing the full potential of this technology.

The integration of AI into electronic health records (EHRs) is also a key area of development. AI can help streamline clinical workflows, reduce administrative burdens, and improve the accuracy of medical documentation.

Frequently Asked Questions (FAQ)

  • Is AI healthcare safe? AI healthcare tools are generally safe when used responsibly and with appropriate safeguards. However, it’s crucial to verify information with a healthcare professional and be aware of potential risks.
  • Will AI replace doctors? No, AI is not expected to replace doctors. It will augment their capabilities, allowing them to focus on more complex cases and provide more personalized care.
  • How is my health data protected? Reputable AI healthcare providers employ robust security measures, such as encryption and data isolation, to protect patient data.
  • What are the limitations of AI in healthcare? AI can struggle with rare or complex cases, and it may be susceptible to bias in algorithms. Human oversight is essential.

The future of healthcare is undeniably intertwined with artificial intelligence. By embracing innovation while prioritizing safety, ethics, and the human touch, we can unlock the transformative potential of AI to improve health outcomes for all.

Want to learn more? Explore our other articles on digital health and artificial intelligence. Subscribe to our newsletter for the latest updates and insights.

January 8, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

by Chief Editor December 27, 2025
written by Chief Editor

MongoDB Vulnerability: A Harbinger of Future Database Security Challenges

A recently disclosed high-severity flaw in MongoDB (CVE-2025-14847) – allowing unauthenticated read access to heap memory – isn’t just a patch-and-move-on situation. It’s a stark reminder of the evolving threat landscape facing database security, and a glimpse into challenges we’ll see amplified in the coming years. This vulnerability, stemming from improper handling of length parameters in Zlib compression, highlights a growing trend: attacks exploiting low-level protocol weaknesses.

The Rise of Protocol-Level Attacks

For years, database security focused heavily on authentication, authorization, and encryption. While these remain crucial, attackers are increasingly targeting the underlying protocols that databases use to communicate. The MongoDB flaw is a prime example. It doesn’t require bypassing login credentials; it exploits a weakness in how data is compressed and transmitted.

We’ve seen similar trends in other areas. The Log4Shell vulnerability (CVE-2021-44228) demonstrated the devastating impact of flaws in widely used logging libraries. These aren’t application-level bugs; they’re fundamental weaknesses in the infrastructure that supports applications. Expect more of this. As software supply chains become more complex, the attack surface expands, and these lower-level vulnerabilities become increasingly attractive targets.

Pro Tip: Regularly audit your database configurations, paying close attention to compression settings and protocol versions. Disabling unnecessary features, like Zlib compression as a temporary mitigation, can significantly reduce your risk.

The Expanding Attack Surface: Cloud and Distributed Databases

The shift to cloud-native and distributed database architectures introduces new layers of complexity – and new potential vulnerabilities. Databases are no longer monolithic entities residing within a secure perimeter. They’re often fragmented across multiple cloud providers, utilizing microservices, and exposed through APIs.

This distributed nature makes it harder to maintain consistent security policies and monitor for malicious activity. A vulnerability in one component can potentially compromise the entire system. Consider the increasing adoption of multi-model databases – databases that support multiple data models (document, graph, key-value) within a single system. Each model introduces its own unique security considerations.

According to Gartner, by 2026, 70% of new database deployments will be cloud-native. This trend necessitates a shift towards cloud-native security tools and practices, including robust identity and access management (IAM), data loss prevention (DLP), and continuous monitoring.

AI-Powered Attacks and Database Security

Artificial intelligence (AI) is a double-edged sword. While AI can enhance database security through threat detection and automated vulnerability management, it can also be used by attackers to automate and scale their attacks.

AI-powered fuzzing, for example, can rapidly identify vulnerabilities in database protocols and APIs. AI can also be used to craft sophisticated SQL injection attacks that bypass traditional security measures. Furthermore, AI can analyze database traffic patterns to identify sensitive data and potential targets.

A recent report by IBM Security highlights the growing use of AI by cybercriminals, with a significant increase in AI-powered phishing attacks and malware campaigns. Database security teams need to proactively adopt AI-driven security solutions to stay ahead of these evolving threats.

The Importance of Zero Trust Database Security

The traditional “trust but verify” security model is no longer sufficient. The principle of Zero Trust – never trust, always verify – is becoming increasingly essential for database security. This means implementing strict access controls, continuously monitoring user activity, and verifying the integrity of data at every stage of the lifecycle.

Zero Trust database security involves several key components:

  • Microsegmentation: Isolating database workloads to limit the blast radius of a potential breach.
  • Multi-Factor Authentication (MFA): Requiring multiple forms of authentication to access sensitive data.
  • Data Encryption: Protecting data both in transit and at rest.
  • Continuous Monitoring and Auditing: Tracking user activity and identifying suspicious behavior.

Mitigation and Future-Proofing

For the current MongoDB vulnerability, upgrading to a patched version (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30) is the most effective solution. As a temporary workaround, disabling Zlib compression is recommended. However, this can impact performance.

Looking ahead, organizations should prioritize:

  • Regular Vulnerability Scanning: Proactively identifying and addressing security flaws.
  • Security Awareness Training: Educating employees about the latest threats and best practices.
  • Incident Response Planning: Developing a plan to effectively respond to and recover from security incidents.
  • Database Activity Monitoring (DAM): Real-time monitoring of database traffic to detect and prevent malicious activity.

FAQ

Q: What is CVE-2025-14847?
A: It’s a high-severity vulnerability in MongoDB that allows unauthenticated users to read uninitialized heap memory.

Q: How can I protect my MongoDB database?
A: Upgrade to a patched version or disable Zlib compression.

Q: What is Zero Trust security?
A: A security model based on the principle of “never trust, always verify.”

Q: Will AI make database security harder?
A: Yes, AI can be used by attackers to automate and scale their attacks, but it can also be used to enhance security.

Stay informed about the latest database security threats and best practices. Explore our other articles and subscribe to our newsletter for regular updates.

December 27, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

by Chief Editor December 22, 2025
written by Chief Editor

December 22, 2025Ravie LakshmananMalware / Open Source / Supply Chain Security

The Rising Tide of Malicious Packages: A Looming Threat to Software Supply Chains

The recent discovery of “lotusbail,” a malicious npm package masquerading as a WhatsApp API, and a wave of compromised NuGet packages targeting the cryptocurrency ecosystem, aren’t isolated incidents. They represent a dangerous escalation in supply chain attacks – a trend poised to become even more prevalent and sophisticated in the coming years. These attacks exploit the trust developers place in open-source repositories, turning essential tools into conduits for malware.

Understanding the Attack Vectors: Beyond Simple Code Injection

Historically, supply chain attacks focused on directly compromising widely used software components. Today, attackers are becoming more subtle. “lotusbail,” with its 56,000+ downloads, didn’t simply inject malicious code; it offered a functional API, luring developers into unwittingly granting it access to sensitive data like WhatsApp credentials, message history, and even enabling persistent account hijacking. This is a key shift. Attackers are now prioritizing deception alongside technical exploitation.

The NuGet package attacks further illustrate this trend. By targeting the crypto space, attackers aimed for high-value targets – developers building applications that handle financial transactions. The packages employed tactics like inflated download counts and rapid version releases to appear legitimate, exploiting the inherent trust in active maintenance. The focus on stealing Google Ads OAuth information in one package demonstrates a broadening scope beyond direct financial gain, targeting advertising infrastructure.

Did you know? Supply chain attacks are estimated to have increased by 650% between 2021 and 2023, according to a report by Check Point Research.

The Future of Supply Chain Attacks: AI, Automation, and Polymorphism

Several factors suggest these attacks will become more frequent and harder to detect. The increasing adoption of AI and machine learning by attackers will play a significant role. AI can be used to:

  • Generate more convincing malicious code: AI can write code that closely mimics legitimate libraries, making it harder for static analysis tools to identify threats.
  • Automate vulnerability discovery: AI can scan open-source repositories for vulnerabilities faster and more efficiently than human researchers.
  • Create polymorphic malware: AI can generate variations of malware that evade signature-based detection systems.

Automation will also be crucial. Attackers will likely automate the process of creating and publishing malicious packages, allowing them to target a wider range of ecosystems and quickly adapt to security measures. We’ll see more sophisticated techniques to manipulate package metadata and reputation scores.

The Rise of the “Living Off the Land” (LotL) Approach

The “lotusbail” case exemplifies a growing trend: attackers leveraging existing tools and APIs to achieve their objectives. This “Living Off the Land” (LotL) approach makes detection more difficult because malicious activity blends in with legitimate system processes. Instead of introducing entirely new malware, attackers are hijacking existing functionality. Expect to see more attacks that exploit legitimate APIs and services in unexpected ways.

The Impact on Emerging Technologies: IoT and Edge Computing

The vulnerability of software supply chains extends beyond traditional software development. The proliferation of IoT devices and edge computing environments creates new attack surfaces. These devices often rely on pre-built software components and have limited security capabilities, making them prime targets for supply chain attacks. Compromised firmware updates, for example, could allow attackers to gain control of entire networks of IoT devices.

Proactive Defense Strategies: Shifting Left and Embracing Zero Trust

Combating these threats requires a fundamental shift in security thinking. Organizations need to move beyond reactive security measures and embrace proactive strategies, including:

  • Software Bill of Materials (SBOM): Creating a detailed inventory of all software components used in an application.
  • Supply Chain Security Scanning: Using tools to automatically scan open-source dependencies for known vulnerabilities and malicious code. Snyk and Sonatype are examples of companies offering these services.
  • Zero Trust Architecture: Implementing a security model that assumes no user or device is trusted by default.
  • Enhanced Code Review: Investing in thorough code review processes to identify potential vulnerabilities and malicious code.
  • Dependency Pinning: Specifying exact versions of dependencies to prevent unexpected updates that could introduce vulnerabilities.

Pro Tip: Regularly audit your development environment and dependencies. Don’t rely solely on reputation scores – verify the integrity of the code yourself.

The Role of Open-Source Communities and Collaboration

Addressing the supply chain security challenge requires collaboration between developers, security researchers, and open-source communities. Sharing threat intelligence, developing secure coding practices, and fostering a culture of security awareness are essential. Initiatives like the Open Source Security Foundation (OpenSSF) are playing a crucial role in promoting these efforts.

FAQ: Supply Chain Security

  • What is a software supply chain attack? A software supply chain attack targets the components and processes used to develop and distribute software, aiming to inject malicious code or compromise legitimate systems.
  • Why are supply chain attacks increasing? Attackers are finding it easier to compromise widely used software components than to directly attack individual targets.
  • How can developers protect themselves? Use SBOMs, scan dependencies for vulnerabilities, implement zero trust principles, and practice secure coding.
  • What is an SBOM? A Software Bill of Materials is a nested inventory of a software application’s components, used to identify and manage security risks.

The threat landscape is evolving rapidly. Staying ahead requires a proactive, multi-layered approach to security, a commitment to collaboration, and a recognition that the software supply chain is a critical vulnerability that demands constant vigilance.

Want to learn more? Explore our other articles on open-source security and threat intelligence. Subscribe to our newsletter for the latest updates on cybersecurity threats and best practices.

December 22, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

by Chief Editor December 20, 2025
written by Chief Editor

The Rise of Device Code Phishing: A Glimpse into the Future of Account Takeovers

A concerning trend is rapidly gaining traction in the cybersecurity landscape: device code phishing. Recent reports, including analysis by Proofpoint of the UNK_AcademicFlare campaign attributed to a Russia-aligned group, highlight a sophisticated technique for stealing Microsoft 365 credentials. This isn’t a fleeting threat; it’s a harbinger of how attackers will increasingly leverage legitimate system features against us. The core issue? Attackers are exploiting the convenience of device code authentication to bypass traditional security measures.

How Device Code Phishing Works – And Why It’s So Effective

Traditional phishing relies on tricking users into directly entering usernames and passwords on fake login pages. Device code phishing is more subtle. It directs victims to a legitimate Microsoft login page after they’ve already initiated a seemingly harmless action – like reviewing a document link. The attacker intercepts the generated access token, effectively gaining control of the account. This method is particularly dangerous because it leverages Microsoft’s own security protocols, making it harder for users and security systems to detect.

The availability of readily accessible tools like Graphish and SquarePhish is dramatically lowering the barrier to entry for these attacks. These tools don’t require advanced technical skills, meaning even less sophisticated threat actors can launch highly effective campaigns. According to a recent Verizon Data Breach Investigations Report (DBIR), phishing remains the primary vector for data breaches, accounting for over 74% of breaches in 2024. The evolution to device code phishing represents a significant escalation in sophistication within this already dominant attack vector.

The Geopolitical Landscape: Russia-Aligned Actors and Beyond

The UNK_AcademicFlare campaign is just one example. Attribution consistently points to Russia-aligned groups like Storm-2372, APT29, and others actively employing this technique. Their targets are strategically chosen: government organizations, think tanks, educational institutions, and critical infrastructure. This suggests a clear intent to gather intelligence, disrupt operations, or potentially conduct espionage. However, it’s crucial to understand that this technique isn’t exclusive to state-sponsored actors. The ease of use and effectiveness mean it will likely be adopted by a wider range of cybercriminals.

Did you know? The initial documentation of device code phishing by Microsoft and Volexity in February 2025 served as a blueprint for subsequent attacks, demonstrating how quickly threat actors adapt and refine their tactics.

Future Trends: What to Expect in the Coming Years

Several trends suggest device code phishing will become even more prevalent and sophisticated:

  • Increased Automation: Attackers will likely automate the entire process, from initial phishing email to token interception, reducing the need for manual intervention.
  • Multi-Cloud Targeting: While currently focused on Microsoft 365, attackers will adapt this technique to target other cloud platforms like Google Workspace and Amazon AWS.
  • AI-Powered Phishing: Artificial intelligence will be used to create more convincing and personalized phishing emails, increasing the likelihood of success. Expect more sophisticated natural language processing to bypass spam filters and more realistic fake landing pages.
  • Bypassing Multi-Factor Authentication (MFA): Device code phishing effectively circumvents traditional MFA methods, making it a particularly dangerous threat for organizations relying solely on MFA for security.
  • Supply Chain Attacks: Attackers may target software vendors or service providers to distribute phishing links to a wider audience, amplifying the impact of their campaigns.

Proactive Defense: Mitigating the Risk

Organizations need to move beyond reactive security measures and adopt a proactive approach to defend against device code phishing. Here are some key steps:

  • Conditional Access Policies: Implement Conditional Access policies in Microsoft 365 to block device code authentication flows for all users, or restrict it to approved users, operating systems, and IP ranges.
  • Enhanced Monitoring: Monitor for unusual login activity, such as logins from unexpected locations or devices.
  • User Awareness Training: Educate employees about the dangers of device code phishing and how to identify suspicious emails and links. Simulated phishing exercises can help reinforce this training.
  • Zero Trust Architecture: Adopt a Zero Trust security model, which assumes that no user or device is trusted by default.
  • Endpoint Detection and Response (EDR): Deploy EDR solutions to detect and respond to malicious activity on endpoints.

Pro Tip: Regularly review and update your security policies to ensure they are aligned with the latest threat landscape. Don’t rely on a “set it and forget it” approach.

FAQ: Device Code Phishing – Your Questions Answered

  • What is device code phishing? It’s a phishing technique that exploits Microsoft’s device code authentication process to steal credentials.
  • Is MFA enough to protect against this? No, device code phishing bypasses traditional MFA methods.
  • Who is behind these attacks? Primarily Russia-aligned threat actors, but the technique is becoming more widespread.
  • How can I protect my organization? Implement Conditional Access policies, enhance monitoring, and provide user awareness training.
  • What tools are attackers using? Tools like Graphish and SquarePhish are lowering the barrier to entry for these attacks.

Further reading on Microsoft’s security guidance can be found here. For more information on threat intelligence, explore resources from Proofpoint and Volexity.

The evolution of phishing tactics demands constant vigilance and adaptation. Device code phishing is not just a new technique; it’s a sign of a more sophisticated and dangerous threat landscape. Organizations that prioritize proactive security measures and invest in user education will be best positioned to defend against these evolving attacks.

What are your thoughts on the future of phishing? Share your insights in the comments below!

December 20, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

by Chief Editor August 9, 2025
written by Chief Editor

AI-Powered Phishing and Crypto Threats: What’s Next in the Cybercrime Landscape

The cybersecurity world is in constant evolution, with threat actors leveraging cutting-edge technologies to exploit vulnerabilities. Recent campaigns in Brazil highlight a concerning trend: the convergence of generative AI and financial fraud. This article dives deep into these threats, offering insights and projections for the future.

Generative AI: The New Tool of Choice for Phishers

As reported by security researchers, cybercriminals are now using AI-powered website builders like DeepSite AI and BlackBox AI to create convincing phishing pages. These tools allow them to quickly generate lookalike websites that mimic legitimate entities, such as government agencies.

Real-Life Example: Phishing sites impersonating Brazilian government departments are tricking users into making fraudulent PIX payments. The sophistication of these sites, combined with SEO poisoning, increases their chances of success.

These AI-generated sites are not just copies; they are designed to mimic the behavior of authentic websites, requesting personal information in stages to build trust. They even validate information using APIs, adding a layer of credibility that’s hard to detect.

Did you know? The use of generative AI lowers the barrier to entry for cybercrime, making it easier for less-skilled actors to launch sophisticated attacks.

The Rise of Crypto Theft and Advanced Malware Campaigns

Beyond phishing, Brazil is also targeted by malware campaigns that target cryptocurrency. One such campaign, the Efimer Trojan, leverages malspam to steal cryptocurrency by replacing wallet addresses on clipboards with the attacker’s address.

Data Point: Recent telemetry indicates that the Efimer Trojan has affected over 5,000 users, with the majority of infections concentrated in Brazil and other countries.

This Trojan is spread through compromised WordPress sites, malicious torrents, and email campaigns that contain malicious scripts. The Efimer Trojan uses a clipper malware to steal cryptocurrency, while simultaneously capturing screenshots and executing further payloads received from its command-and-control server.

Pro Tip: Regularly update your software, use strong passwords, and enable two-factor authentication to protect your accounts.

Future Trends: What to Expect

Looking ahead, the fusion of AI and cybercrime will intensify. We can expect to see:

  • More Sophisticated Phishing: AI will refine the ability to create highly convincing phishing campaigns, making it difficult for even experienced users to spot the fake.
  • Increased Automation: AI-powered tools will automate attacks, allowing cybercriminals to launch massive campaigns with minimal effort.
  • Targeted Attacks: Criminals will use AI to personalize attacks, making them more effective by tailoring them to individual targets and their habits.
  • Evolving Malware: Malware will become more sophisticated, using advanced evasion techniques to avoid detection and adapt in real time.

The use of social engineering will continue, but with AI, it could be enhanced to exploit more sensitive information.

Staying Safe: Proactive Security Measures

Protecting yourself requires a multi-layered approach. Key strategies include:

  • Cybersecurity Awareness Training: Educate yourself and your team about the latest threats.
  • Regular Software Updates: Keeping software up to date helps protect against known vulnerabilities.
  • Strong Passwords and Multi-Factor Authentication: Using strong, unique passwords, and enabling multi-factor authentication is essential.
  • Endpoint Detection and Response (EDR): Implement EDR solutions to detect and respond to threats.
  • Vigilance with Payment Systems: Be cautious of unsolicited payment requests and verify the legitimacy of any payment requests, such as PIX.

FAQ: Your Cybersecurity Questions Answered

We address some of the most commonly asked questions:

Q: How can I identify a phishing website?

A: Look for subtle clues like typos, unusual domain names, and requests for personal information that are out of context.

Q: What should I do if I suspect I’ve been phished?

A: Change your passwords immediately, report the incident to the relevant authorities, and monitor your accounts for any unauthorized activity.

Q: How does AI make phishing more effective?

A: AI allows attackers to create personalized and convincing messages, making them harder to identify as fake. Also, the speed and scale of attacks are amplified by AI tools.

Q: What are the most common types of malware?

A: Trojans, viruses, ransomware, and spyware are among the most prevalent types of malware.

Q: Can I fully protect myself from cyberattacks?

A: Full protection is nearly impossible. However, by implementing robust security practices and staying informed, you can significantly reduce the risk.

Q: Why is Brazil a frequent target?

A: Brazil is a major economic hub with a high number of internet users, making it an attractive target for financially motivated cyberattacks.

August 9, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

by Chief Editor July 20, 2025
written by Chief Editor

Microsoft SharePoint Under Siege: Future Trends in Zero-Day Exploitation

The digital landscape is perpetually shifting, and right now, a critical vulnerability in Microsoft SharePoint Server, CVE-2025-53770, is at the forefront of that change. This zero-day flaw, with a concerning CVSS score of 9.8, is being actively exploited, signaling a worrying trend in how attackers are targeting on-premises systems. But what does this mean for the future of cybersecurity, and what can organizations do to stay ahead?

The Current Threat Landscape: A Deep Dive

The exploitation campaign leverages a deserialization bug, allowing malicious actors to execute code remotely. This isn’t just theoretical; it’s happening. The vulnerability is described as a variant of a previously patched spoofing bug, CVE-2025-49706, highlighting the persistence and adaptability of cybercriminals. Microsoft is aware of the attacks, as reported on July 19, 2025, and is working on a comprehensive update. This underscores the importance of proactive security measures.

The attacks involve delivering malicious ASPX payloads via PowerShell. These payloads steal the SharePoint server’s MachineKey configuration, including the ValidationKey and DecryptionKey. This access allows attackers to generate valid __VIEWSTATE payloads, effectively enabling remote code execution for any authenticated SharePoint request.

Future Trends: What to Expect

So, what does this mean for the future? We can anticipate several trends:

  • Increased Targeting of On-Premises Systems: As organizations continue to adopt hybrid cloud models, on-premises systems like SharePoint remain critical targets. Attackers will likely intensify their focus on these areas, understanding the potential for significant impact.
  • Sophisticated Exploit Chains: We’re already seeing attackers chain vulnerabilities. Expect more complex exploit chains, combining multiple flaws to achieve their objectives. This makes detection and remediation more challenging.
  • Focus on Lateral Movement: Once inside a system, attackers aim to move laterally, gaining access to more sensitive data. The SharePoint vulnerability is being used to achieve that, and this strategy will become more prevalent.
  • Rise of “Living off the Land” Techniques: Attackers are increasingly using existing tools and processes within a system to carry out attacks. PowerShell, in this case, is a perfect example. This makes detection more difficult.

Proactive Steps to Secure Your Systems

Here’s what you can do to mitigate the risks:

  • Implement AMSI Integration: Microsoft recommends configuring Antimalware Scan Interface (AMSI) integration in SharePoint. Ensure this is enabled.
  • Deploy Endpoint Detection and Response (EDR): EDR solutions can detect and block post-exploit activity. Implement a robust EDR solution.
  • Keep Systems Updated: Patching is crucial. Stay vigilant and apply security updates as soon as they become available.
  • Network Segmentation: Segment your network to limit the impact of a breach. If an attacker gains access to one part of your network, they shouldn’t be able to easily access everything.
  • Employee Training: Educate your employees about phishing, social engineering, and other tactics attackers use to gain initial access.

Did you know?

The initial access vector for these types of attacks often involves exploiting known vulnerabilities, which underscores the importance of keeping systems up to date.

Frequently Asked Questions (FAQ)

Q: What is a zero-day vulnerability?

A: A zero-day vulnerability is a software flaw that is unknown to the vendor and for which there is no public patch.

Q: Is SharePoint Online affected?

A: No, Microsoft has confirmed that SharePoint Online in Microsoft 365 is not impacted.

Q: What is the CVSS score?

A: The Common Vulnerability Scoring System (CVSS) is a scoring system that measures the severity of a software vulnerability.

Q: What are the immediate steps to take?

A: Configure AMSI integration and consider disconnecting the SharePoint server from the internet until a security update is available, if AMSI cannot be enabled. Deploy EDR.

Q: How can I stay informed about these threats?

A: Regularly check the Microsoft Security Response Center and reputable cybersecurity news sources, like The Hacker News, for updates.

July 20, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

by Chief Editor June 19, 2025
written by Chief Editor

Jun 19, 2025Ravie LakshmananLinux / Vulnerability



Unveiling the Future of Linux Security: Emerging Threats and Trends

Recent discoveries of local privilege escalation (LPE) vulnerabilities in major Linux distributions highlight a critical shift in cybersecurity. These flaws, allowing attackers to gain root access, are becoming increasingly sophisticated. This article delves into these vulnerabilities, explores the emerging trends in Linux security, and offers insights for IT professionals and cybersecurity enthusiasts alike.

Understanding the Latest Linux LPE Vulnerabilities

The cybersecurity landscape is ever-evolving, and these recent findings underscore that point. Two key vulnerabilities, discovered by Qualys, target core components of Linux systems:

  • CVE-2025-6018: Exploits a flaw in SUSE 15’s Pluggable Authentication Modules (PAM), enabling privilege escalation from an unprivileged user to allow_active.
  • CVE-2025-6019: Targets libblockdev through the udisks daemon, allowing an allow_active user to achieve full root privileges.

These vulnerabilities underscore a concerning trend: the exploitation of chained vulnerabilities. By combining weaknesses in multiple components, attackers can bypass security measures and achieve their objectives.

Did you know? The “allow_active” privilege often signifies a user logged in via a graphical user interface (GUI) or SSH session. Exploiting vulnerabilities in this context significantly lowers the barrier to a full system compromise.

The Rising Complexity of Linux Exploits

The days of simple, easily detectable exploits are fading. Modern Linux exploits leverage intricate combinations of system features and configuration quirks. The use of PAM, udisks, and other legitimate services makes detection and mitigation increasingly difficult.

Consider this: the recent vulnerabilities exploit PAM and udisks, services many administrators consider standard. Attackers are adept at identifying weak points within these seemingly secure areas. The situation is made worse by the fact that udisks is often included by default in most Linux distributions.

Saeed Abbasi from Qualys Threat Research Unit aptly stated that “By chaining legitimate services…attackers who own any active GUI or SSH session can vault across polkit’s allow_active trust zone and emerge as root in seconds.” This highlights the urgency of a proactive security stance.

The Role of PAM in Linux Security

PAM, or Pluggable Authentication Modules, is a critical component of Linux security. It provides a framework for authentication and authorization, and it’s often a prime target for attackers. The recent path traversal flaw (CVE-2025-6020) discovered in Linux PAM further highlights the importance of secure PAM configurations.

Pro Tip: Regularly audit your PAM configuration files for vulnerabilities. Utilize security tools and follow best practices for hardening PAM. Consider employing tools that monitor PAM activity for suspicious behavior.

Future Trends in Linux Security

Looking ahead, several trends will shape the future of Linux security:

  • Automation in Exploitation: We can expect to see more automated tools that chain together vulnerabilities, making attacks faster and easier to execute.
  • Increased Focus on Supply Chain Security: With dependencies being a primary attack vector, ensuring the integrity of the software supply chain will become even more critical.
  • AI-Powered Threat Detection: Artificial intelligence and machine learning will play a larger role in detecting anomalies and preventing attacks in real-time.
  • Microsegmentation and Zero Trust: Embracing microsegmentation and zero-trust architectures will limit the potential impact of successful exploits.

Mitigation Strategies and Best Practices

Protecting your Linux systems requires a multi-layered approach:

  • Patching: Apply security patches immediately after they are released. This is the first and most crucial step.
  • Regular Auditing: Conduct regular security audits to identify vulnerabilities.
  • Least Privilege: Implement the principle of least privilege to limit the impact of a successful attack.
  • Intrusion Detection Systems (IDS): Deploy an IDS to detect suspicious activity.
  • Security Information and Event Management (SIEM): Use a SIEM to aggregate and analyze security events for comprehensive threat monitoring.

FAQ: Frequently Asked Questions

Q: What is local privilege escalation (LPE)?

A: LPE is a type of attack where an attacker gains higher-level access (e.g., root privileges) on a system, starting from a lower-level user account.

Q: How can I check if my system is vulnerable to CVE-2025-6018 and CVE-2025-6019?

A: Consult your Linux distribution’s security advisories. They will provide guidance and specific checks for identifying vulnerable configurations.

Q: What is the “allow_active” user?

A: The “allow_active” user typically refers to a user who is logged into the system via a GUI or an SSH session.

Q: What is the best mitigation for these vulnerabilities?

A: The primary mitigation strategy is to apply the security patches released by your Linux distribution vendors. Additionally, review and harden your PAM and udisks configurations.



Cybersecurity

The information contained in this article aims to shed light on recent Linux vulnerabilities and emerging trends. Stay vigilant, keep your systems patched, and follow best practices for robust cybersecurity.



Cybersecurity

Found this article interesting? Share your thoughts in the comments below!

June 19, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

by Chief Editor June 3, 2025
written by Chief Editor

DevOps Servers Under Siege: The Rising Threat of Cryptojacking

The digital landscape is constantly evolving, and with it, the tactics employed by cybercriminals. One of the most concerning trends in recent months is the increasing exploitation of publicly accessible DevOps servers for cryptojacking. This insidious practice involves illicitly mining cryptocurrencies using the computational resources of compromised systems, leading to significant financial losses for organizations and individuals alike.

Understanding the Current Landscape: Key Findings

Recent reports, like those from cloud security firms such as Wiz, detail the alarming rise in cryptojacking campaigns targeting popular DevOps tools. These campaigns, such as the one dubbed “JINX-0132,” are exploiting a variety of vulnerabilities and misconfigurations within tools like Docker, Gitea, HashiCorp Consul, and Nomad. The attackers are leveraging these weaknesses to gain unauthorized access and deploy cryptocurrency mining software.

A particularly concerning aspect of these attacks is the shift towards using readily available tools from platforms like GitHub. This approach makes it harder to trace the origins of the attacks, as the attackers don’t need to build their own infrastructure for staging purposes. By utilizing existing resources, they can maintain a low profile and focus on maximizing their illicit profits.

Did you know? Cryptocurrency mining consumes significant energy. Compromised servers contribute to increased energy consumption, which is a concern for both organizations and the environment.

Deep Dive: Exploiting DevOps Weaknesses

The attack vectors used in these campaigns are diverse, but the underlying principle is the same: identifying and exploiting security gaps in DevOps tools. Here are some key vulnerabilities being targeted:

  • Docker API Misconfigurations: Exposed Docker APIs allow attackers to execute malicious code, such as spinning up containers to mine cryptocurrency.
  • Gitea Vulnerabilities: Older versions of Gitea can be vulnerable to remote code execution if the attacker has access to create git hooks.
  • HashiCorp Consul Misconfigurations: Improperly configured Consul servers can allow arbitrary code execution, enabling attackers to deploy mining software.
  • Nomad Default Configurations: Nomad’s default settings, which are not secure-by-default, make it easy for attackers to create and run malicious jobs.

Pro tip: Regularly audit your DevOps tool configurations and implement strict access controls to minimize your risk.

The Role of AI and Open WebUI in the Crosshairs

The exploitation of AI-related tools adds another layer of complexity to the cryptojacking threat landscape. Attackers are targeting misconfigured systems hosting tools like Open WebUI to upload malicious Python scripts. These scripts then download and execute cryptocurrency miners. The rise of these attacks signals a new wave of sophisticated attacks that leverage the capabilities of AI and machine learning (ML).

Example: Sysdig’s report highlights how Open WebUI is being exploited to install both Linux and Windows-based cryptominers and steal information.

Future Trends: What to Expect

As DevOps adoption continues to grow, so will the focus of cryptojacking campaigns. We can anticipate several key trends:

  • Increased Automation: Attackers will increasingly automate their attacks, making them faster and more efficient.
  • Sophisticated Evasion Techniques: Criminals will use advanced evasion techniques to avoid detection by security tools.
  • Targeting of Cloud-Native Environments: The focus will shift to cloud-native platforms as more organizations embrace them.
  • Focus on AI-Powered Attacks: Expect an increase in attacks that use AI to identify vulnerabilities and deploy malicious payloads.

Proactive Strategies: How to Protect Your DevOps Infrastructure

Defending against cryptojacking requires a proactive, multi-layered approach. Here are some essential steps:

  • Regular Security Audits: Conduct thorough security audits to identify vulnerabilities and misconfigurations.
  • Implement Strong Access Controls: Enforce the principle of least privilege and limit access to sensitive systems.
  • Patch Vulnerabilities Promptly: Stay up-to-date with security patches for all your DevOps tools.
  • Monitor for Unusual Activity: Implement robust monitoring systems to detect suspicious behavior, such as increased CPU usage or network traffic.
  • Educate Your Team: Train your team on the latest threats and best practices for securing DevOps environments.

Did you know? Using a Web Application Firewall (WAF) can help protect against some of the common attack vectors used in cryptojacking campaigns.

FAQ

Here are some frequently asked questions about cryptojacking in DevOps:

What is cryptojacking?

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency.

How does cryptojacking affect DevOps servers?

Cryptojacking drains CPU and RAM resources, leading to performance degradation and potential financial losses.

What are the signs of a cryptojacking attack?

Increased CPU usage, unusual network activity, and unfamiliar processes running on your servers are all signs of a potential attack.

How can I protect my DevOps infrastructure?

Regular security audits, strong access controls, timely patching, and robust monitoring are all critical steps.

Where can I find more information?

Consult cloud security providers, cybersecurity blogs, and industry reports for more details and up-to-date information.

The fight against cryptojacking in DevOps is ongoing, and it’s essential for organizations to stay informed and proactive. By understanding the latest threats and implementing robust security measures, you can significantly reduce your risk and protect your valuable resources.

Are you concerned about cryptojacking threats? Share your thoughts and experiences in the comments below! What security measures have you implemented to protect your systems?

June 3, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

by Chief Editor May 30, 2025
written by Chief Editor

The Dark Side of AI: How Fake Tools are Shaping the Future of Cyber Threats

The rise of Artificial Intelligence (AI) has been nothing short of meteoric. From revolutionizing industries to reshaping our daily lives, AI’s potential seems limitless. However, this rapid advancement also presents a darker side: the exploitation of AI’s popularity by malicious actors. As a cybersecurity expert, I’ve observed a disturbing trend of fake AI tools being used as bait, leading to a surge in sophisticated cyberattacks.

The Bait: Fake AI Installers and Their Deadly Payload

Cybercriminals are savvy. They understand the allure of cutting-edge technology. That’s why we’re seeing a proliferation of fake installers mimicking popular AI tools like ChatGPT and InVideo AI. These aren’t just clumsy attempts; they’re sophisticated campaigns designed to ensnare unsuspecting users. The objective? To deploy a variety of threats, from ransomware to destructive malware.

A prime example is the fake “NovaLeadsAI” website. It promises free access to a lead monetization platform, enticing users to download what appears to be a legitimate program. In reality, this .NET executable installs CyberLock ransomware. The ransomware encrypts files and demands a hefty ransom, often with a twisted justification.

Did you know? Cybercriminals are increasingly using social engineering tactics, such as posing as charities or using geopolitical events to manipulate victims and increase the likelihood of payment.

Ransomware: The AI-Powered Extortion Scheme

Ransomware attacks have become increasingly prevalent, and the trend is likely to continue. The CyberLock case reveals how attackers are leveraging seemingly innocent tools to launch devastating attacks. These attacks are not only technically complex but also demonstrate a disturbing level of planning and execution. The demand for payment in Monero, a cryptocurrency that offers more anonymity, further complicates the recovery process for victims.

Pro Tip: Always verify the legitimacy of software downloads. Check the website’s URL, look for official security certifications, and read user reviews before downloading and installing anything.

Destructive Malware: Beyond Encryption

It’s not just about holding files hostage. Numero, the destructive malware deployed through fake InVideo AI installers, offers a stark reminder of the damage cyberattacks can cause. By manipulating the Windows GUI, this malware renders machines unusable, effectively halting operations and causing significant financial losses.

This highlights a shift in tactics. Cybercriminals are expanding their arsenal beyond encryption, focusing on ways to disrupt systems and maximize impact. As AI tools continue to evolve, so will the methods used to exploit them. Consider the potential of AI-powered malware that can autonomously adapt and evade detection. The stakes are higher than ever.

The Expanding Threat Landscape: Beyond Desktop Software

The threat is not limited to desktop applications. Malicious actors are increasingly using social media platforms like Facebook and LinkedIn to spread their attacks. Through malicious ads, they redirect users to fake websites, impersonating legitimate AI video generator tools. This technique, known as malvertising, is incredibly effective because it leverages the trust users place in these established platforms.

One recent campaign, tracked as UNC6032, deployed a Rust-based dropper payload called STARKVEIL, that downloads multiple malware families. It contains a downloader, a .NET backdoor for information gathering, and a remote access trojan (RAT) to monitor and control the infected systems. The modular nature of these attacks, including a fail-safe mechanism with multiple payloads, suggests that the attackers are prepared to adapt and overcome security measures.

The Future of AI Exploitation: Trends to Watch

The threat landscape is dynamic and evolving. Here are some trends to keep an eye on:

  • AI-Generated Phishing: Expect more sophisticated phishing campaigns leveraging AI to create personalized and convincing emails, making it harder to spot malicious intent.
  • AI-Powered Malware: The development of self-learning malware that can evade detection and adapt to security measures is a growing concern.
  • Deepfake Attacks: With AI, creating realistic deepfakes has become easier. These deepfakes can be used for social engineering, fraud, and disinformation campaigns.
  • Supply Chain Attacks: The increasing reliance on AI in software development could make the software supply chain a prime target. Attackers may target AI models or libraries to inject malicious code.

To stay safe in this environment, we need to take the appropriate precautions. Regular security audits, employee education, and investing in advanced threat detection tools are essential for building robust cybersecurity measures. Remember, the key is vigilance and staying informed.

Frequently Asked Questions (FAQ)

Q: How can I protect myself from fake AI tools?

A: Be cautious of software downloads. Always verify the source, check for security certifications, and read reviews. Avoid clicking on suspicious links in emails or social media.

Q: What should I do if I suspect I’ve downloaded a fake AI tool?

A: Immediately disconnect your device from the internet. Run a full system scan with updated antivirus software. Report the incident to your IT department or relevant cybersecurity authorities.

Q: How do I spot a phishing attempt using AI?

A: Look for generic greetings, grammar errors, and requests for personal information. Be wary of any email that creates a sense of urgency or uses threats.

The Bottom Line

The rise of AI presents incredible opportunities, but also significant risks. By staying informed, being proactive, and adopting a cautious approach to new technologies, we can navigate the evolving threat landscape. As the digital world continues to change, remember that your online safety depends on your awareness and preparation.

Ready to learn more? Check out our other articles on cybersecurity best practices and emerging technology threats! Don’t forget to subscribe to our newsletter for the latest updates and insights on staying safe in the digital world.

May 30, 2025 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Fluminense vs Flamengo: Zubeldía Takes Responsibility for Defeat & Distance from League Lead

    April 13, 2026
  • Neha Dhupia Shares Why She Swears by Milk Daily—Expert Reveals How Much Is Truly Healthy

    April 13, 2026
  • Body Found Hidden in Wall at Construction Site in Colón, Entre Ríos

    April 13, 2026
  • FC Twente’s Title Bid: Perez & El Ahmadi Discuss Tough Schedule | Eredivisie 2024/2025

    April 13, 2026
  • Splatoon Raiders & Fire Emblem: Fortune’s Weave – Summer Release Possible?

    April 13, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World