Category: CyberSecurityNews

Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks
05
Nov
2025

Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks

European organizations are facing an unprecedented wave of ransomware attacks as cybercriminals increasingly integrate artificial intelligence tools into their operations….

October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams
05
Nov
2025

October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams

October 2025 marked a notable escalation in cyber threats, with phishing campaigns and ransomware variants exploiting trusted cloud services to…

Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges
05
Nov
2025

Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges

A privilege escalation flaw in Windows Cloud Files Mini Filter Driver has been discovered, allowing local attackers to bypass file…

AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks
05
Nov
2025

AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks

A critical security vulnerability in the AI Engine WordPress plugin has put more than 100,000 active installations at risk of…

7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks
05
Nov
2025

7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks

Seven critical vulnerabilities in OpenAI’s ChatGPT, affecting both GPT-4o and the newly released GPT-5 models, that could allow attackers to…

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
05
Nov
2025

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10

A sophisticated threat actor known as Curly COMrades has deployed an innovative attack methodology that leverages legitimate Windows virtualization features…

Guide to Choosing the Best Free Backup Software 
05
Nov
2025

Guide to Choosing the Best Free Backup Software 

Any individual heavily depends on data as their most critical asset: from memorable photos to important work documents, everything must…

FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence
05
Nov
2025

FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence

The notorious FIN7 threat group, also known by the nickname Savage Ladybug, continues to pose a significant risk to enterprise…

DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware
05
Nov
2025

DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware

DragonForce, a ransomware-as-a-service operation active since 2023, has dramatically evolved into what researchers now describe as a structured cybercriminal cartel,…

CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks
05
Nov
2025

CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a dangerous OS command injection vulnerability affecting…

Hackers Exploit OneDrive.exe Through DLL Sideloading to Execute Arbitrary Code
05
Nov
2025

Hackers Exploit OneDrive.exe Through DLL Sideloading to Execute Arbitrary Code

A sophisticated attack technique that exploits Microsoft’s OneDrive application through DLL sideloading, allowing threat actors to execute malicious code while…

Microsoft Warns Windows Systems May Enter BitLocker Recovery After October 2025 Updates
05
Nov
2025

Microsoft Warns Windows Systems May Enter BitLocker Recovery After October 2025 Updates

Microsoft has issued an urgent advisory for Windows users, highlighting a potential glitch that could force certain devices into the…