Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack

Posted on August 3, 2025August 3, 2025 By CWS

Welcome to this week’s version of Cybersecurity Information Recap! On this concern, we convey you the newest updates and important developments throughout the risk panorama.

Keep forward of dangers with key insights on newly found Chrome and Gemini vulnerabilities, the surge of refined Linux malware, and an in-depth take a look at the rising “man-in-the-prompt” assault tactic focusing on AI programs.

Whether or not you’re an IT skilled, safety fanatic, or just involved about digital security, our roundup delivers important data and actionable takeaways to maintain you safe in an ever-evolving cyber world.

1. New Shuyal Malware Hits 19 Fashionable Browsers

A brand new channel of the Shuyal malware household is focusing on 19 broadly used internet browsers. Shuyal’s operators make use of superior evasion methods to bypass safety options and deploy multi-stage payloads, posing a major threat to organizations counting on mainstream browsers.Learn extra: cybersecuritynews.com/new-shuyal-attacking-19-popular-browsers/

2. Muddled Libra Shifts to Voice Phishing for Speedy Company Breaches

The Muddled Libra group has pivoted from e mail phishing to stylish voice-based social engineering (vishing), focusing on organizational name facilities. By impersonating staff, they persuade IT assist to reset credentials and MFA, granting near-instant entry to delicate programs. Attackers attain area admin privileges in beneath 40 minutes and have expanded focus to authorities, insurance coverage, retail, and aviation sectors.Learn extra: cybersecuritynews.com/muddled-libra-actors-attacking-organizations/

3. IIS Servers Attacked with Superior Internet Shell Script

Hackers are actively exploiting vulnerabilities in Microsoft IIS servers utilizing a brand new internet shell script, permitting stealthy distant code execution and protracted entry. System directors are urged to patch and monitor their servers for uncommon exercise.Learn extra: cybersecuritynews.com/hackers-attacking-iis-servers-with-new-web-shell-script/

4. SAP NetWeaver Zero-Day Exploited by A number of Menace Actors

Researchers report energetic exploitation of a essential SAP NetWeaver vulnerability (CVE-2025-31324). The flaw permits unauthenticated attackers to add malicious information and execute distant instructions, focusing on each Home windows and Linux installations. The patch has been launched—clients should act instantly.Learn extra: cybersecuritynews.com/sap-netweaver-vulnerability-exploited-malware/

5. ATM Networks Breached Utilizing Raspberry Pi Units

A financially motivated group, UNC2891, gained entry to ATM networks by bodily putting in a 4G-enabled Raspberry Pi gadget. This assault exploited each bodily and digital vulnerabilities, permitting distant command-and-control entry and risking monetary fraud by means of hidden rootkits and undetected malware.Learn extra: cybersecuritynews.com/atm-network-hacked-using-raspberry-pi/

6. SharePoint Servers Severely Uncovered to Web Assaults

A zero-day vulnerability affecting on-premises SharePoint servers is being actively exploited. Impacted organizations are suggested to take all internet-exposed SharePoint cases offline and apply obtainable patches. SharePoint On-line just isn’t affected.Learn extra: cybersecuritynews.com/sharepoint-servers-exposed-to-internet/

7. EDR-on-EDR Assaults Spotlight Endpoint Safety Dangers

Attackers are actually leveraging vulnerabilities in Endpoint Detection and Response (EDR) merchandise to focus on and disable competing EDR options throughout the identical community, paving the best way for undetected malware deployment. This underscores the necessity for strong EDR configurations and layered defenses.Learn extra: cybersecuritynews.com/edr-on-edr-violence/

Threats

1. Atomic macOS Stealer Launches with Subtle New Backdoor

A brand new variant of the Atomic macOS Stealer has been noticed with enhanced backdoor capabilities. This newest model can keep away from detection, steal credentials, and keep persistent entry, posing a rising risk to Mac customers.Learn extra: cybersecuritynews.com/atomic-macos-stealer-comes-with-new-backdoor/

2. Android Malware Rental Contains Superior 2FA Interception

Researchers have found a service providing Android malware as a rentable bundle, now together with 2FA interception options. Cybercriminals are more and more leveraging these instruments to seize one-time passcodes through the login course of, making assaults extra harmful for cell customers.Learn extra: cybersecuritynews.com/renting-android-malware-with-2fa-interception/

3. Armouryloader: Bypassing System Safety Protections

The brand new ‘Armouryloader’ malware demonstrates superior methods to bypass system safety protections. Focused assaults utilizing this malware can evade conventional defenses, emphasizing the necessity for up to date endpoint safety.Learn extra: cybersecuritynews.com/armouryloader-bypassing-system-security-protections/

4. Lumma Stealer Reveals Full Assault and An infection Chain

A deep dive into the Lumma password stealer exposes a posh malware an infection chain that may unfold quickly throughout programs. The report particulars methods that improve an infection charges and information exfiltration.Learn extra: cybersecuritynews.com/lumma-password-stealer-attack-infection-chain/

5. 0bj3ctivityStealer Exploits New Execution Strategies

A brand new risk, 0bj3ctivityStealer, has emerged with a novel execution chain that helps it evade detection and maximize payload supply on compromised programs.Learn extra: cybersecuritynews.com/0bj3ctivitystealers-execution-chain/

6. Ransomware Teams Collaborate with TrickBot Operators

Latest campaigns present ransomware teams partnering with TrickBot malware operators, combining sources to breach enterprise networks and enhance ransom payouts.Learn extra: cybersecuritynews.com/ransomware-groups-using-trickbot-malware/

7. Plague Malware Targets Linux Servers

A newly recognized “Plague” malware is attacking Linux servers by exploiting unpatched vulnerabilities and poor safety configurations, posing dangers to server infrastructure and hosted information.Learn extra: cybersecuritynews.com/plague-malware-attacking-linux-servers/

Vulnerability

1. Vital Vulnerability in Cisco Id Providers Engine

A newly found vulnerability exposes Cisco’s ISE platform to distant code execution and privilege escalation dangers. The flaw could be exploited by unprivileged attackers through a community, underlining the significance of speedy patching.Learn extra: cybersecuritynews.com/cisco-identity-services-engine-vulnerability

2. Gemini CLI Beneath Fireplace: Vulnerability Permits Hidden Command Execution

Researchers recognized a essential flaw in Google’s Gemini CLI software—permitting attackers to silently run malicious instructions on developer programs by means of immediate injection and damaged validation. Disguised payloads may exfiltrate credentials with out person consciousness. Improve to v0.1.14+ instantly!Learn extra: cybersecuritynews.com/gemini-cli-vulnerability/

3. SonicWall: A number of n-Day Vulnerabilities Revealed

Not too long ago revealed advisories element a number of exploited n-day vulnerabilities in SonicWall merchandise, pushing organizations to replace and implement layered defenses as attackers more and more goal unpatched endpoints.Learn extra: cybersecuritynews.com/sonicwall-n-day-vulnerabilities/

4. Chrome Pushes Emergency Safety Replace

Google issued an pressing safety replace for the Chrome browser to handle a number of actively exploited vulnerabilities. Customers are urged to use updates to stop infections and information breaches.Learn extra: cybersecuritynews.com/chrome-security-update-138/

5. SonicWall SSL VPN Uncovered to DoS Assaults

A brand new Denial-of-Service vulnerability affecting SonicWall SSL VPN gadgets may allow attackers to disrupt enterprise operations. Immediate software program upgrades are really useful.Learn extra: cybersecuritynews.com/sonicwall-ssl-vpn-dos-vulnerability/

6. “Man-in-the-Immediate” Assault Targets AI-Powered Dev Instruments

Cybersecurity consultants are warning of a novel “Man-in-the-Immediate” assault focusing on AI-driven coding assistants, the place malicious immediate manipulation may trigger AI fashions to execute dangerous instructions or leak secrets and techniques.Learn extra: cybersecuritynews.com/man-in-the-prompt-attack/

7. CrushFTP 0-Day: Technical Particulars & PoC Printed

Full technical particulars and a proof-of-concept have been launched for an actively exploited 0-day in CrushFTP. Rapid motion is required for at-risk admins.Learn extra: cybersecuritynews.com/crushftp-0-day-technical-details-poc-released/

8. Google Challenge Zero’s Newest Vulnerability Disclosure

Challenge Zero researchers at Google revealed their newest findings, together with detailed stories on just lately uncovered zero-day exploits and their influence on main software program ecosystems.Learn extra: cybersecuritynews.com/google-project-zero-vulnerability-disclosure/

Different Information

1. GitHub Outage Disrupts Tens of millions of Builders

On July 28, 2025, GitHub skilled a world outage, briefly hindering code pushes, API requests, and concern monitoring capabilities for builders worldwide. The incident, traced to networking issues, induced intermittent errors for round 4% of requests and delayed deployments, however full restoration occurred inside about 3.5 hours.Learn extra: cybersecuritynews.com/github-outage-disrupts-core-services

2. Apple Integrates Native Containerization in macOS

Apple unveiled a local containerization stack for macOS at WWDC 25, enabling Macs to run OCI photos in micro-VMs—making it attainable to launch Kali Linux instantly with out Docker Desktop. This characteristic, focusing on Apple Silicon with full launch in “Tahoe” (macOS 26) this fall, vastly improves safety, velocity, and useful resource use for Linux workflows on Mac.Learn extra: cybersecuritynews.com/apples-containerization-feature-macos

3. Palo Alto Networks to Purchase CyberArk

Palo Alto Networks introduced intentions to amass id safety chief CyberArk, signaling a significant consolidation within the cybersecurity sector. The strategic transfer goals to strengthen cloud id safety and increase zero-trust choices.Learn extra: cybersecuritynews.com/palo-alto-networks-acquire-cyberark

4. ChatGPT: Shaping the Way forward for Search Engines

OpenAI’s ChatGPT is more and more influencing search traits, providing pure language solutions that reshape how customers entry data—posing new challenges and alternatives for established search engines like google.Learn extra: cybersecuritynews.com/chatgpt-conversations-search-engines

5. WhatsApp Zero-Click on Exploit Alert

Safety consultants warn of a zero-click vulnerability in WhatsApp, permitting attackers to compromise gadgets with out person interplay. Rapid patching and vigilance are suggested for each people and enterprises.Learn extra: cybersecuritynews.com/whatsapp-0-click-exploit

Cyber Security News Tags:Attack, Chrome, Cybersecurity, Gemini, Linux, Malware, ManinthePrompt, News, Recap, Vulnerabilities

Post navigation

Previous Post: How to Safely Use Free Wi-Fi at Cafes and Airports

Related Posts

Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection  Cyber Security News
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News
Windows 11 Gets New AI-Powered Features Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack
  • How to Safely Use Free Wi-Fi at Cafes and Airports
  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack
  • How to Safely Use Free Wi-Fi at Cafes and Airports
  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News