Category: CyberSecurityNews

Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as "Top Secret"
10
Nov
2025

Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret”

Intel has filed a federal lawsuit against a former employee accused of downloading thousands of classified documents shortly after being…

New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies
10
Nov
2025

New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies

The manufacturing sector faces an escalating threat landscape as cybercriminals increasingly exploit cloud-based platforms and artificial intelligence services to conduct…

Google's Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data
10
Nov
2025

Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data

Google has expanded its Gemini AI model’s Deep Research feature to pull data directly from users’ Gmail, Google Drive, and…

10 Popular Black Friday Scams, How to Detect the Red Flags and Protect your wallet and Data
10
Nov
2025

10 Popular Black Friday Scams, How to Detect the Red Flags and Protect your wallet and Data

Black Friday 2025 represents the most dangerous shopping season in cybercrime history, with fraudsters leveraging artificial intelligence, deepfake technology, and…

Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges
10
Nov
2025

Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges

Elastic has disclosed a significant security vulnerability in Elastic Defend for Windows that could allow attackers to escalate their privileges…

MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks
10
Nov
2025

MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks

MAD-CAT (Meow Attack Data Corruption Automation Tool) targets MongoDB, Elasticsearch, Cassandra, Redis, CouchDB, and Hadoop HDFS, exactly the systems hit…

Monsta web-based FTP Remote Code Execution Vulnerability Exploited
10
Nov
2025

Monsta web-based FTP Remote Code Execution Vulnerability Exploited

A critical remote code execution vulnerability in Monsta FTP, a popular web-based FTP client used by financial institutions and enterprises…

Critical runc Vulnerabilities Put Docker and Kubernetes Container Isolation at Risk
10
Nov
2025

Critical runc Vulnerabilities Put Docker and Kubernetes Container Isolation at Risk

Three critical vulnerabilities in runc, the container runtime powering Docker, Kubernetes, and other containerization platforms. These flaws could allow attackers…

AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine's
10
Nov
2025

AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s

HackGPT Enterprise is a new tool made for security teams focuses on being scalable and compliant, meeting the growing need…

New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic
09
Nov
2025

New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic

A sophisticated side-channel attack that exposes the topics of conversations with AI chatbots, even when traffic is protected by end-to-end…

Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
08
Nov
2025

Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched

QNAP has addressed seven critical zero-day vulnerabilities in its network-attached storage (NAS) operating systems, following their successful exploitation by security…

Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
08
Nov
2025

Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews

Scammers are targeting businesses with a new extortion scheme, and Google Maps is fighting back with a dedicated reporting tool….