Category: CyberSecurityNews

How Malicious AI Hijacks Victim Agents
01
Nov
2025

How Malicious AI Hijacks Victim Agents

Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems. The…

Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
01
Nov
2025

Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Cybercriminals and state-sponsored actors are ramping up attacks on unpatched Cisco IOS XE devices across Australia, deploying a persistent Lua-based…

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
01
Nov
2025

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

The notorious Akira ransomware group announced on October 29, 2025, that it successfully breached the systems of Apache OpenOffice, exfiltrating…

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
01
Nov
2025

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a critical use-after-free vulnerability in the…

Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
01
Nov
2025

Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations

Windows Server Update Services (WSUS) vulnerability is actively exploited in the wild. Criminals are using this vulnerability to steal sensitive…

Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
31
Oct
2025

Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Throughout the first half of 2025, financially motivated threat actors have shifted their approach to intrusions, abandoning traditional implant-heavy methods…

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
31
Oct
2025

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data

The explosive growth of artificial intelligence has created an unexpected security threat as cybercriminals exploit ChatGPT’s popularity through counterfeit mobile…

Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
31
Oct
2025

Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data

In mid-2025, researchers discovered a sophisticated campaign orchestrated by the Chinese state-sponsored threat group BRONZE BUTLER (also known as Tick)…

Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams
31
Oct
2025

Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams

Google is strengthening its defense against mobile scams with advanced AI-powered protections built directly into Android devices. As cybercriminals become…

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability
31
Oct
2025

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability

Progress Software has released critical security patches addressing a high-severity vulnerability affecting MOVEit Transfer, a widely used enterprise file transfer…

Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer
31
Oct
2025

Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer

Microsoft has launched Researcher with Computer Use in Microsoft 365 Copilot, marking a significant advancement in autonomous AI technology. This…

AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID
31
Oct
2025

AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has become a favored weapon in…