cybercory

#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

31 C
Dubai
Tuesday, February 24, 2026
cybercory
HomeTopics 1Application Security

Application Security

spot_imgspot_imgspot_imgspot_img

Oracle E-Business Suite Alert – CVE-2025-61882: Remote, No-Auth RCE in BI Publisher Integration

Oracle has issued a Security Alert for CVE-2025-61882, a critical vulnerability in Oracle E-Business Suite’s BI Publisher integration that is remotely exploitable without authentication...

One Token to Rule Them All: Critical Entra ID Flaw Could Have Exposed Every Tenant

A researcher has uncovered what may be one of the most severe cloud identity vulnerabilities ever found-one that could have given attackers global admin...

Malicious Versions of Nx NPM Packages Published: Developers Urged to Update Immediately

Cybersecurity researchers have discovered that malicious versions of the popular Nx npm packages were recently published, posing a significant threat to developers and organizations...

Microsoft Patches Critical Exchange Hybrid Vulnerability Allowing Cloud Privilege Escalation

On 6 August 2025, Microsoft released a critical security update addressing a newly documented Elevation of Privilege vulnerability-CVE-2025-53786-impacting Microsoft Exchange Server Hybrid Deployments. The...

Tea App Confirms Cyberattack: Legacy Data Leak Exposes 72,000 Images Including Selfie IDs

On 25 July 2025, women-centric platform Tea confirmed a serious cybersecurity incident involving unauthorized access to a legacy storage system. Roughly 72,000 images, including...

macOS.ZuRu Resurfaces via Trojanized Termius App Using Modified Khepri C2 Beacon

On 10 July 2025, cybersecurity researchers uncovered a renewed campaign of the macOS.ZuRu backdoor, this time embedded within a doctored version of the popular...

macOS NimDoor Malware: DPRK Hackers Target Web3 and Crypto Platforms with Nim-Based Precision

North Korean threat actors have launched a sophisticated macOS malware campaign targeting Web3 and cryptocurrency companies using a rare Nim-based backdoor known as NimDoor....

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img