Category: CyberSecurityNews

25
Sep
2025

Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

A critical vulnerability chain in Salesforce’s Agentforce AI platform, which could have allowed external attackers to steal sensitive CRM data….

Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets
25
Sep
2025

Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets

Cybercriminals have orchestrated a sophisticated phishing campaign exploiting GitHub’s notification system to impersonate the prestigious startup accelerator Y Combinator, targeting…

Cisco IOS and XE Vulnerability Let Remote Attacker Bypass Authentication and Access Sensitive Data
25
Sep
2025

Cisco IOS and XE Vulnerability Let Remote Attacker Bypass Authentication and Access Sensitive Data

A critical vulnerability in the implementation of the TACACS+ protocol for Cisco IOS and IOS XE Software could allow an…

New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors
25
Sep
2025

New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors

BRICKSTORM has surfaced as a highly evasive backdoor targeting organizations within the technology and legal industries, exploiting trust relationships to…

SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes
25
Sep
2025

SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes

SetupHijack, an open-source research utility, has emerged as a powerful method for red teaming and security research by targeting race…

New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems
25
Sep
2025

New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems

Following a major law enforcement disruption in February 2024, the notorious LockBit ransomware group has resurfaced, marking its sixth anniversary…

ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data
25
Sep
2025

ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data

A critical path traversal flaw in ZendTo has been assigned CVE-2025-34508 researchers discovered that versions 6.15–7 and prior enable authenticated…

COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH
25
Sep
2025

COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH

In recent weeks, security researchers have observed a surge in targeted attacks attributed to the COLDRIVER advanced persistent threat (APT)…

Volvo Group Discloses Data Breach After Ransomware Attack on HR Supplier
25
Sep
2025

Volvo Group Discloses Data Breach After Ransomware Attack on HR Supplier

Volvo Group North America has begun notifying employees and associates about a data breach that exposed their personal information, including…

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes
25
Sep
2025

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Luxembourg, Luxembourg, September 25th, 2025, CyberNewsWire Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the…

NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges
25
Sep
2025

NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges

A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library (CVE-2025-23298) enables unauthenticated attackers to achieve remote code execution (RCE) with root…

Numerous Applications Using Google's Firebase Platform Leaking Highly Sensitive Data
25
Sep
2025

Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data

Numerous mobile applications have been found to expose critical user information through misconfigured Firebase services, allowing unauthenticated attackers to access…