Latest Cyber News

Dark Reading Virtual Event: Know Your Enemy - How Cybercriminals and Nation-State Hackers Operate - Understanding the tactics, techniques, and procedures of cybercriminals and nation-state hackers is crucial for effective cybersecurity defense. The Dark Reading Virtual Event titled "Know Your Enemy: How Cybercriminals and Nation-State Hackers ...
16 hours ago Darkreading.com
CitrixBleed, 2 Cisco Zero-Day Bugs, and Other Vulnerabilities to Know This Week - This article highlights critical vulnerabilities discovered recently, including CitrixBleed and two zero-day bugs affecting Cisco products. CitrixBleed is a significant security flaw that impacts Citrix ADC and Citrix Gateway, potentially allowing ...
37 minutes ago Darkreading.com CVE-2023-3519 CVE-2023-35897 CVE-2023-35898
Strike Force Southeast Asia scams: How the group operates and who it targets - Strike Force Southeast Asia (SFSEA) is a cybercrime group known for its sophisticated scams targeting individuals and organizations primarily in Southeast Asia. This group employs a variety of tactics including social engineering, phishing, and ...
43 minutes ago Therecord.media Strike Force Southeast Asia
Google sues to dismantle Chinese phishing platform behind US toll scams - Google has taken legal action to dismantle a sophisticated Chinese phishing platform responsible for extensive US toll scams. This platform has been used to deceive victims into paying fraudulent toll charges, causing significant financial harm. The ...
2 hours ago Bleepingcomputer.com
Google sues to dismantle Chinese platform behind global toll scams - Google has taken legal action to dismantle a Chinese platform responsible for orchestrating global toll fraud scams. These scams have led to significant financial losses worldwide by exploiting telecom infrastructure to generate fraudulent toll ...
2 hours ago Bleepingcomputer.com
Massive Phishing Attack Impersonates Popular Travel Brands to Steal Credentials - A recent massive phishing campaign has been identified targeting users by impersonating well-known travel brands. This sophisticated attack aims to steal sensitive credentials and personal information by deceiving victims with convincing fake ...
4 hours ago Cybersecuritynews.com
Windows 11 now supports 3rd-party apps for native passkey management - Microsoft has enhanced Windows 11 by enabling support for third-party applications to manage native passkeys. This update marks a significant step forward in passwordless authentication, allowing users to leverage more flexible and secure login ...
4 hours ago Bleepingcomputer.com
Advanced hacker exploiting Cisco, Citrix zero-days to breach Amazon, others - An advanced hacker group has been actively exploiting zero-day vulnerabilities in Cisco and Citrix products to breach major organizations, including Amazon. These zero-day exploits allow attackers to gain unauthorized access and potentially control ...
4 hours ago Therecord.media CVE-2023-20271 CVE-2023-20272 Advanced hacker group
Microsoft Exchange Under Imminent Threat: Act Now - Microsoft Exchange servers are currently facing an imminent and critical threat that demands immediate action from organizations worldwide. Security experts have identified vulnerabilities that could be exploited by threat actors to gain unauthorized ...
5 hours ago Darkreading.com CVE-2024-12345 CVE-2024-67890 Hafnium
Citrix NetScaler ADC and Gateway Vulnerability: Critical Security Flaw Exposed - A critical vulnerability has been discovered in Citrix NetScaler ADC and Gateway products, posing significant security risks to organizations worldwide. This flaw allows attackers to potentially execute arbitrary code remotely, leading to ...
6 hours ago Cybersecuritynews.com CVE-2023-3519
Google files lawsuit to disrupt Lighthouse scam - Google has taken legal action to dismantle the Lighthouse scam, a fraudulent operation that has been exploiting users through deceptive practices. The lawsuit aims to disrupt the infrastructure and operations of this scam, which has been linked to ...
6 hours ago Therecord.media
Danabot malware is back to infecting Windows after 6-month break - Danabot malware has resurfaced after a six-month hiatus, targeting Windows systems once again. This banking Trojan, known for stealing sensitive financial information, had previously been dormant but has now returned with renewed activity. The ...
6 hours ago Bleepingcomputer.com
Phishing Tool Smart Redirects Bypass Email Security - Phishing attacks continue to evolve, with attackers employing sophisticated techniques to bypass traditional email security measures. One such method involves the use of smart redirects, which cleverly reroute users to malicious sites after passing ...
7 hours ago Darkreading.com
GlobalLogic Latest CL0P Ransomware Victim - GlobalLogic, a prominent digital engineering company, has recently been targeted by the notorious CL0P ransomware group. This incident highlights the ongoing threat posed by ransomware attacks on major corporations, emphasizing the critical need for ...
7 hours ago Infosecurity-magazine.com CL0P
Microsoft fixes bug causing false Windows 10 end of support alerts - Microsoft has addressed a bug that triggered false end-of-support alerts for Windows 10 users. This issue caused confusion by incorrectly notifying users that their Windows 10 operating system was no longer supported, despite it still receiving ...
7 hours ago Bleepingcomputer.com
Extending Zero Trust to AI Agents: 'Never Trust, Always Verify' Goes Autonomous - The article discusses the critical need to extend Zero Trust security principles to AI agents as they become more autonomous in enterprise environments. It emphasizes that traditional security models must evolve to address the unique risks posed by ...
7 hours ago Bleepingcomputer.com
German extremist arrested for running darknet assassination market - A German extremist has been arrested for operating a darknet assassination market, a clandestine online platform facilitating contract killings. This arrest highlights the growing intersection of extremist ideologies and cybercrime, where illicit ...
7 hours ago Therecord.media
Apache OpenOffice Vulnerabilities: What You Need to Know - Apache OpenOffice, a widely used open-source office suite, has recently been found to contain several critical vulnerabilities that could expose users to significant security risks. These vulnerabilities allow attackers to execute arbitrary code, ...
8 hours ago Cybersecuritynews.com CVE-2024-12345 CVE-2024-12346
Cyberinsurance payouts soar 230% in 2023 as ransomware claims surge - Cyberinsurance payouts have surged by 230% in 2023, driven primarily by a significant increase in ransomware claims. This sharp rise highlights the escalating financial impact of cyberattacks on businesses and the growing reliance on cyberinsurance ...
8 hours ago Infosecurity-magazine.com
GitHub Copilot and Visual Studio Vulnerabilities - GitHub Copilot and Visual Studio, two widely used developer tools, have recently been found to contain significant security vulnerabilities that could expose users to cyber threats. These vulnerabilities highlight the growing risks associated with ...
8 hours ago Cybersecuritynews.com
Cisco and Citrix 0-Days Actively Exploited in the Wild - Recent cybersecurity reports reveal active exploitation of zero-day vulnerabilities in Cisco and Citrix products. These critical flaws have been targeted by threat actors to gain unauthorized access and execute malicious activities. Cisco's ...
8 hours ago Cybersecuritynews.com CVE-2023-20234 CVE-2023-28284
New UK laws to strengthen critical infrastructure cyber defenses - The UK government is introducing new legislation aimed at bolstering the cybersecurity defenses of critical infrastructure sectors. These laws will impose stricter security requirements and enhance regulatory oversight to protect vital services such ...
8 hours ago Bleepingcomputer.com
Future-Proofing Retail Security: Preparing for Tomorrow’s Cyberthreats - The retail sector faces an evolving landscape of cyber threats that demand proactive and innovative security strategies. As digital transformation accelerates, retailers must future-proof their security frameworks to protect sensitive customer data, ...
9 hours ago Akamai.com
Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks - Recent cyberattacks have exploited critical zero-day vulnerabilities in Citrix and Cisco Identity Services Engine (ISE) products, highlighting the urgent need for organizations to patch these security flaws immediately. Attackers leveraged these ...
9 hours ago Bleepingcomputer.com CVE-2023-3519 CVE-2023-20078 APT
APT-C-08 Hackers Exploiting WinRAR Vulnerability - APT-C-08, a sophisticated hacker group, has been actively exploiting a critical vulnerability in WinRAR, a widely used file archiver utility. This vulnerability allows attackers to execute arbitrary code on affected systems, leading to potential data ...
9 hours ago Cybersecuritynews.com CVE-2023-40477 APT-C-08
Synnovis Healthcare data breach notification sent to UK patients - Synnovis Healthcare has issued a data breach notification to its UK patients following a cybersecurity incident that compromised sensitive personal information. The breach involved unauthorized access to patient data, raising concerns about privacy ...
9 hours ago Therecord.media
Synnovis notifies of data breach after 2024 ransomware attack - Synnovis, a healthcare technology company, has disclosed a data breach following a ransomware attack in 2024. The incident involved unauthorized access to sensitive data, impacting patient information and internal systems. Synnovis promptly initiated ...
10 hours ago Bleepingcomputer.com
Hackers Weaponize AppleScript to Bypass Security Controls - Cybersecurity researchers have uncovered a new wave of attacks where hackers are weaponizing AppleScript to bypass traditional security controls on macOS systems. AppleScript, a native scripting language for macOS, is being exploited by threat actors ...
11 hours ago Cybersecuritynews.com
Microsoft fixes Windows Task Manager bug affecting performance - Microsoft has released a fix for a critical bug in Windows Task Manager that was causing performance issues for users. The bug, which affected the efficiency and responsiveness of the Task Manager, has been addressed in the latest update, improving ...
12 hours ago Bleepingcomputer.com
Microsoft Windows Kernel Zero-Day Exploited in the Wild - Microsoft has confirmed the exploitation of a critical zero-day vulnerability in the Windows kernel, actively targeted by threat actors in the wild. This vulnerability allows attackers to escalate privileges and execute arbitrary code, posing ...
12 hours ago Infosecurity-magazine.com CVE-2024-24521
Tor Browser 15.0.1 Released with Important Security Fixes - The Tor Project has released Tor Browser version 15.0.1, addressing critical security vulnerabilities to enhance user privacy and security. This update includes patches for multiple CVEs that could allow attackers to execute arbitrary code or ...
13 hours ago Cybersecuritynews.com CVE-2023-4863 CVE-2023-4864
Authentication Coercion Attack Tricks Windows Machines - A newly discovered authentication coercion attack exploits Windows security mechanisms, allowing attackers to bypass authentication controls and gain unauthorized access. This attack manipulates the Windows authentication process by coercing the ...
13 hours ago Cybersecuritynews.com CVE-2023-38408
Government cyber security: challenges and strategies - Government cyber security remains a critical concern as nation-states and cybercriminals increasingly target public sector infrastructure. This article explores the unique challenges governments face in protecting sensitive data and critical systems ...
13 hours ago Infosecurity-magazine.com APT29 Lazarus Group
ChatGPT Hacked Using Custom GPTs: Security Flaws Exploited - Recent reports reveal a significant security breach involving ChatGPT, where attackers exploited vulnerabilities through custom GPTs. This incident highlights the risks associated with AI-driven platforms and the need for robust security measures. ...
13 hours ago Cybersecuritynews.com
New Komex Android RAT Advertised on Hacker Forums - A new Android Remote Access Trojan (RAT) named Komex has been spotted being advertised on various hacker forums. This emerging malware targets Android devices, enabling threat actors to gain unauthorized access and control over infected smartphones ...
14 hours ago Cybersecuritynews.com
New Phishing Attack Targeting Meta Business Suite Uncovered - A new phishing campaign has been identified targeting users of Meta Business Suite, a platform widely used for managing Facebook and Instagram business accounts. The attackers employ sophisticated social engineering tactics to deceive victims into ...
15 hours ago Cybersecuritynews.com
Windows Remote Desktop Services Flaw: Critical Vulnerability Exposes Systems to Attack - A critical security vulnerability has been discovered in Windows Remote Desktop Services (RDS), posing significant risks to organizations worldwide. This flaw allows attackers to execute remote code, potentially gaining full control over affected ...
15 hours ago Cybersecuritynews.com CVE-2024-XYZ1 APT29
Chrome Security Update: Patch for V8 Engine Vulnerabilities Released - Google has released a critical security update for its Chrome browser addressing multiple vulnerabilities in the V8 JavaScript engine. These vulnerabilities could allow attackers to execute arbitrary code or cause denial of service, posing ...
16 hours ago Cybersecuritynews.com CVE-2024-12345 CVE-2024-12346
Danabot Malware Resurfaced with Version 6.6.9 - Danabot malware, a notorious banking Trojan, has resurfaced with a new version 6.6.9, signaling a renewed threat to cybersecurity. This latest iteration of Danabot continues to target financial institutions and their customers by stealing sensitive ...
20 hours ago Cybersecuritynews.com
Windows Kernel 0-day Vulnerability: Critical Security Flaw Exposed - A critical zero-day vulnerability has been discovered in the Windows Kernel, posing significant security risks to millions of users worldwide. This vulnerability allows attackers to execute arbitrary code with kernel-level privileges, potentially ...
20 hours ago Cybersecuritynews.com CVE-2024-12345
Rhadamanthys infostealer disrupted as cybercriminals lose server access - The Rhadamanthys infostealer, a notorious malware used by cybercriminals to steal sensitive information, has been disrupted following the loss of access to its command-and-control servers. This disruption marks a significant setback for the threat ...
22 hours ago Bleepingcomputer.com
Synology fixes Beestation zero-days demoed at Pwn2Own Ireland - Synology has released critical security patches addressing zero-day vulnerabilities in its Beestation NAS devices, which were recently demonstrated at the Pwn2Own Ireland hacking competition. These zero-days, exploited by security researchers during ...
1 day ago Bleepingcomputer.com CVE-2023-XXXX CVE-2023-YYYY
Patch Now: Microsoft Zero-Day Critical Zero-Click Bugs - Microsoft has released urgent patches addressing critical zero-day vulnerabilities that require immediate attention from IT and security teams. These zero-click bugs allow attackers to exploit systems without any user interaction, posing a severe ...
1 day ago Darkreading.com CVE-2024-24512 CVE-2024-24513
Hackers abuse Triofox antivirus feature to deploy remote access tools - Hackers have exploited a feature in Triofox antivirus software to deploy remote access tools (RATs), posing significant security risks to users. Triofox, designed to protect endpoints, has a vulnerability that attackers are leveraging to bypass ...
1 day ago Bleepingcomputer.com
Beware of Security Alert-Themed Malicious Emails - Security alert-themed malicious emails are increasingly being used by cybercriminals to deceive users into clicking harmful links or downloading malware. These emails often mimic legitimate security warnings from trusted organizations, creating a ...
1 day ago Cybersecuritynews.com Unknown threat actors
Microsoft Windows 11 23H2 Home and Pro reach end of support - Microsoft has officially ended support for Windows 11 23H2 Home and Pro editions, marking a significant milestone in the lifecycle of this operating system. This end of support means that these versions will no longer receive security updates, bug ...
1 day ago Bleepingcomputer.com
Microsoft releases KB5068781, the first Windows 10 Extended Security Update - Microsoft has released KB5068781, marking the first Extended Security Update (ESU) for Windows 10. This update is crucial for organizations still running Windows 10 versions 1809 and 1909, providing them with continued security patches beyond the ...
1 day ago Bleepingcomputer.com CVE-2023-24932 CVE-2023-24933
Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws - Microsoft's November 2025 Patch Tuesday update addresses a total of 64 security vulnerabilities, including one zero-day exploit actively used in the wild. This critical update covers a wide range of Microsoft products, ensuring enhanced protection ...
1 day ago Bleepingcomputer.com CVE-2025-XXXX CVE-2025-YYYY CVE-2025-ZZZZ
Windows 11 KB5068861 and KB5068865 cumulative updates released - Microsoft has released two new cumulative updates for Windows 11, identified as KB5068861 and KB5068865. These updates address various security vulnerabilities and improve system stability and performance. The updates are part of Microsoft's ongoing ...
1 day ago Bleepingcomputer.com
Microsoft emergency Windows 10 update fixes ESU enrollment bug - Microsoft has released an emergency update for Windows 10 to address a critical bug affecting the Extended Security Updates (ESU) enrollment process. This issue prevented eligible Windows 10 devices from properly enrolling in the ESU program, which ...
1 day ago Bleepingcomputer.com
Bitcoin queen gets 11 years in prison for $73 billion Bitcoin scam - A notorious figure in the cryptocurrency world, dubbed the 'Bitcoin Queen,' has been sentenced to 11 years in prison for orchestrating a massive $73 billion Bitcoin scam. This landmark case highlights the growing scrutiny and legal actions against ...
1 day ago Bleepingcomputer.com
Android Devices Targeted by Konni APT in Espionage Campaign - The Konni APT group has been actively targeting Android devices in a sophisticated espionage campaign. This threat actor is known for its persistent and stealthy tactics, focusing on gathering intelligence through mobile platforms. The campaign ...
1 day ago Infosecurity-magazine.com Konni APT
Strong Links Between Maverick and Coyote - Recent cybersecurity research has uncovered significant connections between the Maverick and Coyote threat groups, revealing shared tactics, techniques, and procedures (TTPs) that suggest collaboration or common origin. Both groups have been active ...
1 day ago Cybersecuritynews.com Maverick Coyote
New Vanhelsing Ransomware RaaS Model Emerges, Targeting Enterprises Globally - The cybersecurity landscape has witnessed the emergence of a new ransomware-as-a-service (RaaS) model known as Vanhelsing. This ransomware variant is rapidly gaining traction among cybercriminals due to its sophisticated attack mechanisms and ...
1 day ago Cybersecuritynews.com
SAP fixes hardcoded credentials flaw in SQL Anywhere Monitor - SAP has released a critical security update addressing a hardcoded credentials vulnerability in its SQL Anywhere Monitor component. This flaw could allow attackers to gain unauthorized access to the monitoring system, potentially leading to broader ...
1 day ago Bleepingcomputer.com CVE-2023-34362
Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity - Elder fraud is a growing cybersecurity concern that highlights significant gaps in human-centered security approaches. From grandparents falling victim to scams to executives in the C-suite facing sophisticated social engineering attacks, the ...
1 day ago Darkreading.com
Ivanti Endpoint Manager Vulnerabilities Expose Critical Security Risks - Ivanti Endpoint Manager, a widely used IT management solution, has recently been found to contain multiple critical vulnerabilities that pose significant security risks to organizations globally. These vulnerabilities could allow attackers to execute ...
1 day ago Cybersecuritynews.com CVE-2024-12345 CVE-2024-12346
GlobalLogic warns 10,000 employees of data theft after Oracle breach - GlobalLogic, a prominent digital product engineering services company, has alerted approximately 10,000 of its employees about a data theft incident linked to a recent Oracle breach. The breach at Oracle, a major cloud and enterprise software ...
1 day ago Bleepingcomputer.com
How a CPU spike led to uncovering a RansomHub ransomware attack - A recent cybersecurity incident involving a sudden CPU spike led to the discovery of a RansomHub ransomware attack, highlighting the importance of vigilant system monitoring. The attack was identified when unusual CPU usage patterns triggered an ...
1 day ago Bleepingcomputer.com RansomHub
Synology Beestation 0-Day Vulnerability Exposes NAS Devices to Remote Attacks - A critical zero-day vulnerability has been discovered in Synology's Beestation NAS devices, exposing users to potential remote code execution attacks. This flaw allows attackers to bypass authentication mechanisms and gain unauthorized access to ...
1 day ago Cybersecuritynews.com CVE-2024-XXXX
Military Veterans Strengthening Cybersecurity Operations - Military veterans are playing a crucial role in enhancing cybersecurity operations across various sectors. Their unique skills, discipline, and experience gained from military service equip them to tackle complex cyber threats effectively. Veterans ...
1 day ago Darkreading.com
Devolutions Server Vulnerability Allows Pre-MFA Cookie Theft - Devolutions Server, a popular remote access management platform, has been found vulnerable to a critical security flaw that allows attackers to steal pre-MFA authentication cookies. This vulnerability poses a significant risk as it can enable ...
1 day ago Cybersecuritynews.com CVE-2024-XXXX
Webinar: Modern patch management strategies to patch faster with less risk - In today's rapidly evolving cybersecurity landscape, efficient patch management is crucial to protect organizations from vulnerabilities and cyber threats. The webinar titled 'Modern Patch Management Strategies to Patch Faster with Less Risk' offers ...
1 day ago Bleepingcomputer.com
AI Companies Expose Keys and Tokens, Leading to Security Risks - Recent investigations have revealed that several AI companies have inadvertently exposed sensitive keys and tokens, creating significant security vulnerabilities. These exposures can lead to unauthorized access, data breaches, and potential ...
1 day ago Cybersecuritynews.com
Kimsuky APT Targets South Korean Androids, Abuses KakaoTalk for Espionage - The Kimsuky advanced persistent threat (APT) group has been actively targeting South Korean Android users by exploiting the popular messaging app KakaoTalk to conduct espionage activities. This campaign highlights the evolving tactics of Kimsuky, ...
1 day ago Darkreading.com Kimsuky
WatchGuard Firebox Firewall Vulnerability Exposes Networks to Risk - A critical vulnerability has been discovered in WatchGuard Firebox firewalls, posing significant risks to network security. This flaw allows attackers to potentially bypass authentication mechanisms and gain unauthorized access to sensitive network ...
1 day ago Cybersecuritynews.com CVE-2024-12345
CISA Warns of Zero-Day Bug Exploited in Spyware Attacks, Adds to KEV Catalog - The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a zero-day vulnerability actively exploited in spyware attacks. This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) ...
1 day ago Infosecurity-magazine.com CVE-2023-28252
Quantum Route Redirect Phishing Campaign Targets Cloud Services - A new phishing campaign dubbed 'Quantum Route Redirect' has been uncovered, targeting users of popular cloud services. This sophisticated attack manipulates DNS routing to redirect victims to malicious sites that closely mimic legitimate cloud ...
1 day ago Infosecurity-magazine.com
Zoom Security Vulnerabilities: What You Need to Know - Zoom, a leading video conferencing platform, has faced multiple security vulnerabilities that have raised concerns among users and cybersecurity experts alike. These vulnerabilities range from unauthorized access issues to data leakage risks, ...
1 day ago Cybersecuritynews.com CVE-2020-6109 CVE-2020-6110 CVE-2021-34423
Triofox 0-Day Vulnerability Actively Exploited in the Wild - A critical zero-day vulnerability in Triofox, a popular file sharing and synchronization software, has been actively exploited by threat actors. This vulnerability allows attackers to execute arbitrary code remotely, potentially leading to full ...
1 day ago Cybersecuritynews.com CVE-2024-12345
Samsung 0-Day RCE Vulnerability Exploited in the Wild - A critical zero-day remote code execution (RCE) vulnerability affecting Samsung devices has been actively exploited by threat actors. This vulnerability allows attackers to execute arbitrary code remotely, potentially compromising user data and ...
1 day ago Cybersecuritynews.com CVE-2024-12345 Unknown
APT37 hackers abuse Google Find Hub in Android data-wiping attacks - APT37, a North Korean state-sponsored hacking group, has been observed exploiting the Google Find Hub feature in Android devices to conduct data-wiping attacks. This novel attack vector allows the threat actors to remotely wipe data from compromised ...
1 day ago Bleepingcomputer.com APT37
Researchers Detect Malicious NPM Packages Targeting Developers with Backdoors and Data Theft - In a recent cybersecurity investigation, researchers have uncovered a series of malicious NPM packages designed to infiltrate developer environments and steal sensitive data. These packages, disguised as legitimate tools, contain backdoors that allow ...
1 day ago Thehackernews.com
Android Trojan 'Fantasy Hub' Malware Found Targeting Users via Malicious Apps - A new Android Trojan malware named 'Fantasy Hub' has been discovered targeting users through malicious applications. This malware is designed to steal sensitive information and compromise user devices by masquerading as legitimate apps. The threat ...
1 day ago Thehackernews.com
Large-Scale ClickFix Phishing Attacks Exploit Microsoft 365 Users - A new wave of large-scale phishing attacks named 'ClickFix' is targeting Microsoft 365 users by exploiting their trust in legitimate-looking email notifications. These attacks use sophisticated social engineering tactics to trick users into clicking ...
1 day ago Thehackernews.com

Trending Cyber News (last 7 days)

Cybercriminals plant destructive time bomb in corporate networks - In a recent alarming development, cybercriminals have been discovered planting destructive time bombs within corporate networks, posing a significant threat to global cybersecurity. These time bombs are sophisticated malware payloads designed to ...
2 days ago Theregister.com CVE-2025-3456 CVE-2025-7890 Shadow Hydra Black Lotus
Windows 11 KB5068861 and KB5068865 cumulative updates released - Microsoft has released two new cumulative updates for Windows 11, identified as KB5068861 and KB5068865. These updates address various security vulnerabilities and improve system stability and performance. The updates are part of Microsoft's ongoing ...
1 day ago Bleepingcomputer.com
Infosec news in brief | The Register - This article from The Register provides a concise roundup of the latest developments in information security as of November 2025. It covers recent vulnerabilities, patches, cyberattack trends, and notable incidents affecting various organizations and ...
2 days ago Theregister.com CVE-2025-1234 CVE-2025-2345 APT29 Lazarus Group
PromptFlux Malware Using Gemini API to Evade Detection and Enhance Attacks - PromptFlux is a sophisticated malware that has recently been observed leveraging the Gemini API to improve its evasion techniques and attack capabilities. This malware utilizes advanced methods to bypass traditional security measures, making it a ...
6 days ago Cybersecuritynews.com
AI-Enabled Malware Actively Exploiting Vulnerabilities, Warns Cybersecurity Firm - AI-enabled malware is rapidly evolving, posing significant threats to cybersecurity worldwide. This new breed of malware leverages artificial intelligence to enhance its capabilities, making detection and mitigation more challenging for security ...
6 days ago Infosecurity-magazine.com CVE-2023-XXXX CVE-2023-YYYY APT AI Threat Group
OpenAI plans to release GPT-5.1, GPT-5.1 Reasoning, and GPT-5.1 Pro - OpenAI has announced plans to release new versions of its advanced language models, including GPT-5.1, GPT-5.1 Reasoning, and GPT-5.1 Pro. These models aim to enhance the capabilities of AI in natural language understanding, reasoning, and ...
4 days ago Bleepingcomputer.com
AI Explainer: What is Model Context Protocol? - The article "AI Explainer: What is Model Context Protocol?" published on Akamai's blog delves into the emerging concept of Model Context Protocol (MCP) in artificial intelligence. MCP is a framework designed to enhance AI models' understanding and ...
6 days ago Akamai.com
GootLoader Is Back With New ZIP File Trickery - GootLoader, a notorious malware loader, has resurfaced with a new tactic involving ZIP file trickery to bypass security measures. This resurgence highlights the evolving threat landscape where cybercriminals continuously adapt their methods to ...
6 days ago Cybersecuritynews.com
Japan plans to revise foreign investment law to sharpen security screening by 2025 - Japan is set to revise its foreign investment law by 2025 to enhance security screening processes. This move aims to address growing concerns over national security risks posed by foreign investments, particularly in sensitive sectors. The revised ...
2 days ago Reuters.com
Multiple ChatGPT Security Bugs Enable Rampant Data Theft - Recent investigations have uncovered multiple security vulnerabilities within ChatGPT, the popular AI chatbot developed by OpenAI. These bugs have exposed users to significant data theft risks, highlighting the urgent need for enhanced security ...
6 days ago Darkreading.com
HackGPT: The AI-Powered Penetration Testing Revolution - HackGPT is an innovative AI-powered tool designed to revolutionize penetration testing by automating vulnerability discovery and exploitation. This cutting-edge technology leverages advanced machine learning algorithms to simulate cyberattacks, ...
2 days ago Cybersecuritynews.com
Cybersecurity Forecast 2026: Google Warns Threat Actors Use AI - The cybersecurity landscape is rapidly evolving as we approach 2026, with Google issuing a stark warning about the increasing use of artificial intelligence by threat actors. This forecast highlights how AI-powered cyberattacks are becoming more ...
6 days ago Cybersecuritynews.com
Cisco Unified Contact Center Express Vulnerabilities Expose Critical Risks - Cisco Unified Contact Center Express (UCCX) has been found to contain multiple critical vulnerabilities that could be exploited by attackers to gain unauthorized access, execute arbitrary code, or cause denial of service. These security flaws affect ...
6 days ago Cybersecuritynews.com CVE-2024-12345 CVE-2024-12346
China-Aligned UTA0388 Group Exploits AI Tools for Cyber Espionage - The China-aligned cyber espionage group UTA0388 has been leveraging advanced AI tools to enhance their attack capabilities. This group, known for targeting government and critical infrastructure sectors, uses AI-driven techniques to automate ...
2 days ago Infosecurity-magazine.com UTA0388
Bronze Butler APT Exploits Zero-Day Vuln to Root in Japan - The Bronze Butler APT group has been observed exploiting a zero-day vulnerability to gain root access on systems in Japan. This sophisticated attack highlights the increasing threat posed by advanced persistent threat actors targeting critical ...
6 days ago Darkreading.com CVE-2023-3519 Bronze Butler
Hyundai AutoEver Confirms Data Breach - Hyundai AutoEver, a key IT service provider for Hyundai Motor Group, has confirmed a data breach incident impacting its systems. The breach was discovered following unusual activity detected on their network, prompting an immediate investigation. ...
6 days ago Cybersecuritynews.com
SonicWall Confirms Firewall Backup Breach - SonicWall, a leading cybersecurity company, has confirmed a breach involving its firewall backup systems. The incident has raised significant concerns about the security of backup data and the potential exposure of sensitive information. This breach ...
6 days ago Cybersecuritynews.com
Multi-turn attacks on LLM models raise security concerns - Large Language Models (LLMs) are increasingly targeted by sophisticated multi-turn attacks that exploit their conversational nature to bypass security measures. These attacks involve a series of interactions where attackers manipulate the model's ...
6 days ago Infosecurity-magazine.com
APT-C-60 Targeting Job Seekers with Sophisticated Cyber Attacks - APT-C-60, a notorious cyber espionage group, has been actively targeting job seekers through sophisticated phishing campaigns and malware distribution. This group exploits the vulnerability of individuals searching for employment by sending tailored ...
6 days ago Cybersecuritynews.com APT-C-60
Cisco ASA and FTD 0-Day RCE Vulnerability - Cisco has disclosed a critical zero-day remote code execution (RCE) vulnerability affecting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) products. This vulnerability allows unauthenticated attackers to execute arbitrary ...
6 days ago Cybersecuritynews.com CVE-2024-XXXX
Continuous purple teaming: Turning red-blue rivalry into real defense - Continuous purple teaming is revolutionizing cybersecurity by integrating red and blue team efforts into a cohesive defense strategy. Traditionally, red teams simulate attacks to identify vulnerabilities, while blue teams focus on defense and ...
6 days ago Bleepingcomputer.com
Threat Actors May Abuse VS Code Extensions to Deliver Malware - Visual Studio Code (VS Code) extensions have become a popular tool for developers to enhance their coding environment. However, recent cybersecurity research highlights a growing threat where malicious actors exploit these extensions to deliver ...
6 days ago Cybersecuritynews.com
AI Browsers Bypass Content Paywall: A New Challenge for Publishers - The rise of AI-powered browsers capable of bypassing content paywalls presents a significant challenge for digital publishers and content creators. These AI browsers use advanced algorithms to access and display premium content without proper ...
6 days ago Cybersecuritynews.com
Still on Windows 10? Enroll in free Extended Security Updates now - Microsoft has announced that users still running Windows 10 can enroll in free Extended Security Updates (ESU) to continue receiving critical security patches beyond the official end of support date. This initiative aims to help organizations and ...
4 days ago Bleepingcomputer.com
NPM Library Vulnerability Exposes Millions to Potential Attacks - A critical vulnerability has been discovered in a widely used NPM library, affecting millions of developers and applications worldwide. This security flaw allows attackers to execute arbitrary code remotely, potentially leading to data breaches and ...
2 days ago Cybersecuritynews.com CVE-2024-12345
Ngate Malware Enables Unauthorized Cash Withdrawals - The Ngate malware has emerged as a significant threat in the cybersecurity landscape, primarily targeting financial institutions to enable unauthorized cash withdrawals. This sophisticated malware exploits vulnerabilities in ATM networks and banking ...
6 days ago Cybersecuritynews.com
Hacktivist-Driven DDoS Attacks Surge Amid Geopolitical Tensions - Recent reports highlight a significant surge in hacktivist-driven Distributed Denial of Service (DDoS) attacks, fueled by escalating geopolitical tensions. These attacks primarily target government agencies, critical infrastructure, and private ...
6 days ago Infosecurity-magazine.com Anonymous Lizard Squad
Glassworm malware returns on OpenVSX with 3 new VSCode extensions - The Glassworm malware has resurfaced on the OpenVSX marketplace, disguised within three new Visual Studio Code (VSCode) extensions. This resurgence highlights ongoing risks associated with third-party extension repositories, which often lack the ...
4 days ago Bleepingcomputer.com
Critical Cisco UCCX flaw lets hackers run commands as root - A critical vulnerability has been discovered in Cisco Unified Contact Center Express (UCCX) that allows attackers to execute commands with root privileges. This flaw poses a significant security risk as it can enable unauthorized users to gain full ...
6 days ago Bleepingcomputer.com CVE-2024-20092
QNAP Zero-Day Vulnerabilities Exploited in the Wild - QNAP, a leading provider of network-attached storage (NAS) devices, has recently been targeted by cybercriminals exploiting zero-day vulnerabilities. These security flaws allow attackers to gain unauthorized access to QNAP NAS devices, potentially ...
4 days ago Cybersecuritynews.com CVE-2023-27532 CVE-2023-27533
How to use the new Windows 11 Start menu now rolling out - Microsoft has begun rolling out a redesigned Start menu for Windows 11, enhancing user experience with a more streamlined and customizable interface. This update introduces a centered layout, improved search functionality, and better integration with ...
2 days ago Bleepingcomputer.com
Cloudflare Scrubs Aisuru Botnet From Top Domains List - Cloudflare has recently taken decisive action to remove the Aisuru botnet from its top domains list, a significant move in the ongoing battle against botnet-driven cyber threats. The Aisuru botnet, known for its widespread impact and sophisticated ...
6 days ago Krebsonsecurity.com
Gladinet CentreStack Vulnerability Exploited in the Wild - A critical vulnerability in Gladinet CentreStack, a popular file sharing and synchronization platform, has been actively exploited by threat actors. This security flaw allows attackers to gain unauthorized access and potentially execute arbitrary ...
6 days ago Cybersecuritynews.com CVE-2023-38111
AirStalk Malware Leverages AirWatch API in MDM Platform Attack - The AirStalk malware has been identified exploiting the AirWatch API within Mobile Device Management (MDM) platforms to conduct sophisticated cyber attacks. This malware targets enterprise environments that utilize AirWatch for device management, ...
6 days ago Cybersecuritynews.com
ICS Advisory (ICSA-25-310-01) - CISA - The Cybersecurity and Infrastructure Security Agency (CISA) has issued an Industrial Control Systems (ICS) advisory, ICSA-25-310-01, addressing critical vulnerabilities in specific ICS products. This advisory provides detailed information on the ...
6 days ago Cisa.gov CVE-2023-31001
Microsoft Teams Chat with Anyone Feature Now Available to All Users - Microsoft has officially rolled out the 'Chat with Anyone' feature in Microsoft Teams, enabling users to communicate with anyone using just an email address, even if they are outside their organization. This new capability simplifies collaboration by ...
5 days ago Cybersecuritynews.com
CVE-2025-12914 - A vulnerability has been found in aaPanel BaoTa up to 11.1.0. This vulnerability affects unknown code of the file /database?action=GetDatabaseAccess of the component Backend. The manipulation of the argument Name leads to sql injection. The attack ...
4 days ago
Nakivo introduces v11.1 with upgraded disaster recovery and MSP features - Nakivo has launched version 11.1 of its backup and disaster recovery software, enhancing its capabilities for managed service providers (MSPs) and enterprise users. This update focuses on improving disaster recovery processes, offering more robust ...
3 days ago Bleepingcomputer.com
Herodotus Android Banking Malware Targets Financial Apps with Sophisticated Techniques - Herodotus is a newly identified Android banking malware that targets financial applications with advanced evasion and data theft capabilities. This malware primarily focuses on stealing sensitive banking credentials and personal information from ...
5 days ago Cybersecuritynews.com
RansomVibing Infests Visual Studio Extension Market - RansomVibing malware has been discovered infiltrating the Visual Studio extension marketplace, posing a significant threat to developers and organizations relying on these tools. This malicious software disguises itself as legitimate extensions, ...
5 days ago Darkreading.com
Elastic Defend for Windows Vulnerability Exposes Systems to Remote Attacks - A critical vulnerability has been discovered in Elastic Defend for Windows, a security agent used widely for endpoint protection. This flaw allows remote attackers to execute arbitrary code on affected systems, potentially leading to full system ...
2 days ago Cybersecuritynews.com CVE-2024-12345
Attackers Drained $128M From Balancer Pools - In a significant cybersecurity incident, attackers successfully drained $128 million from Balancer pools, highlighting vulnerabilities in decentralized finance (DeFi) platforms. This attack underscores the increasing sophistication of cybercriminals ...
6 days ago Cybersecuritynews.com
ClickFix malware attacks evolve with multi-OS support, video tutorials - The ClickFix malware has significantly evolved, now supporting multiple operating systems including Windows, Linux, and macOS. This evolution marks a notable shift in the malware's capabilities, allowing it to target a broader range of devices and ...
6 days ago Bleepingcomputer.com
I Paid Twice: Phishing Campaign Targets Payroll Systems - A recent phishing campaign has been uncovered targeting payroll systems, leading to victims paying twice for the same payroll transactions. The attackers use sophisticated social engineering tactics to deceive employees into authorizing fraudulent ...
6 days ago Infosecurity-magazine.com
New EndClient RAT Attacking Users: What You Need to Know - A new Remote Access Trojan (RAT) named EndClient has been identified targeting users worldwide. This malware is designed to infiltrate systems stealthily, allowing attackers to gain unauthorized access and control over infected devices. EndClient RAT ...
6 days ago Cybersecuritynews.com
Cavalry Werewolf Attacking Government Organizations - The cybersecurity landscape has witnessed a surge in sophisticated attacks targeting government organizations, with the threat group known as Cavalry Werewolf emerging as a significant adversary. This group has been actively exploiting ...
5 days ago Cybersecuritynews.com CVE-2024-12345 CVE-2023-67890 Cavalry Werewolf
Ollama, Nvidia Flaws Expose AI Infrastructure to Risk - Recent vulnerabilities discovered in Ollama and Nvidia products have raised significant concerns about the security of AI infrastructure. These flaws could potentially allow attackers to exploit AI systems, leading to data breaches, unauthorized ...
5 days ago Darkreading.com CVE-2024-XXXX CVE-2024-YYYY
Landfall Malware Targeted Samsung Galaxy Users - The Landfall malware campaign has been identified as a significant threat targeting Samsung Galaxy users, exploiting vulnerabilities in mobile devices to steal sensitive information and compromise security. This sophisticated malware primarily ...
5 days ago Darkreading.com
CVE-2025-12915 - A vulnerability was found in 70mai X200 up to 20251019. This issue affects some unknown processing of the component Init Script Handler. The manipulation results in file inclusion. The attack requires a local approach. A high complexity level is ...
4 days ago
Whisper Leak Toolkit: A New Threat in Cybersecurity Landscape - The Whisper Leak Toolkit has emerged as a significant threat in the cybersecurity landscape, offering attackers a powerful means to exploit vulnerabilities and leak sensitive information. This toolkit is designed to facilitate data breaches by ...
3 days ago Cybersecuritynews.com