Category: CyberSecurityNews

New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors
01
Oct
2025

New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors

Confidential computing promised to protect sensitive workloads in the public cloud. Yet a new low-cost hardware attack, Battering RAM, demonstrates…

Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure
01
Oct
2025

Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure

Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable low-privileged…

New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite
01
Oct
2025

New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite

In recent weeks, security teams worldwide have observed a surge in covert operations orchestrated by a clandestine group known colloquially…

Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links
01
Oct
2025

Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links

Hackers have recently leveraged a vulnerability in the web-based management interfaces of certain cellular routers to co-opt their built-in SMS…

Windows 11 25H2 Released for General Availability
01
Oct
2025

Windows 11 25H2 Released for General Availability

Microsoft has officially released Windows 11, version 25H2, also known as the Windows 11 2025 Update, marking the next feature…

48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild
01
Oct
2025

48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild

A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild.  The…

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
01
Oct
2025

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely

The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote…

Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions
01
Oct
2025

Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions

A concerning cybersecurity trend has emerged as threat actors exploit the growing popularity of artificial intelligence tools by distributing malicious…

Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework
30
Sep
2025

Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework

A sophisticated attack campaign targeting improperly managed Microsoft SQL servers has emerged, deploying the XiebroC2 command and control framework to…

CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks
30
Sep
2025

CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks

In late September 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued a public alert regarding the active exploitation of…

APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials
30
Sep
2025

APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials

In recent months, a surge in targeted intrusions attributed to the Iranian-aligned threat group APT35 has set off alarm bells…

How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds
30
Sep
2025

How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds

Security Operations Centers (SOCs) protect organizations’ digital assets from ongoing cyber threats. To assess their effectiveness, SOCs use key performance…