Category: CyberSecurityNews

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users
06
Nov
2025

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users

ValleyRAT has emerged as a sophisticated multi-stage remote access trojan targeting Windows systems, with particular focus on Chinese-language users and…

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
06
Nov
2025

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server

North Korean threat actors are evolving their attack strategies by leveraging developer-focused tools as infection vectors. Recent security discoveries reveal…

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
06
Nov
2025

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities

The cybercrime landscape has undergone a dramatic transformation in 2025, with artificial intelligence emerging as a cornerstone technology for malicious…

Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication
06
Nov
2025

Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication

Security researchers have uncovered a sophisticated new malware family targeting enterprise environments through a supply chain compromise. The malware, tracked…

New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections
06
Nov
2025

New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections

A sophisticated Remote Access Trojan labeled EndClient RAT has emerged as a significant threat targeting human rights defenders in North…

06
Nov
2025

Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload

The Gootloader malware campaign has resurfaced with sophisticated evasion techniques that allow it to bypass automated security analysis. This persistent…

Critical RCE Vulnerabilities in Claude Desktop Let Attackers Execute Malicious Code
06
Nov
2025

Critical RCE Vulnerabilities in Claude Desktop Let Attackers Execute Malicious Code

A critical remote code execution (RCE) flaw in three official extensions for Anthropic’s Claude Desktop. These vulnerabilities, affecting the Chrome,…

Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes
06
Nov
2025

Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes

On November 3, 2025, blockchain security monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts. An attacker executed…

Multiple Django Vulnerabilities Enable SQL injection and DoS Attack
06
Nov
2025

Multiple Django Vulnerabilities Enable SQL injection and DoS Attack

Django, one of the most popular Python web development frameworks, has disclosed two critical security vulnerabilities that could allow attackers…

Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code
06
Nov
2025

Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code

Cisco has disclosed multiple critical vulnerabilities in Unified Contact Center Express (CCX) that allow unauthenticated remote attackers to execute malicious…

Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders
06
Nov
2025

Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders

International law enforcement agencies have taken down three sophisticated fraud and money laundering networks in a coordinated operation that uncovered…

Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild
06
Nov
2025

Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild

Cisco has confirmed that threat actors are actively exploiting a critical remote code execution (RCE) flaw in its Secure Firewall…