Category: CyberSecurityNews

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
29
Oct
2025

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject lines to evade automated security…

Tata Motors Data Leak - 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
29
Oct
2025

Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys

Security researcher Eaton Zveare has disclosed critical vulnerabilities in Tata Motors’ systems that exposed over 70 terabytes of sensitive data,…

Pentest Copilot - AI-based Ethical Hacking Tool to Streamline Penetration Testing
29
Oct
2025

Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing

Pentest Copilot is an innovative open-source tool that leverages AI to help ethical hackers streamline penetration testing workflows. This browser-based…

Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
29
Oct
2025

Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls

A sophisticated information-stealing malware named Anivia Stealer has emerged on underground forums, marketed by a threat actor known as ZeroTrace….

Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
28
Oct
2025

Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls

Cybersecurity researchers have uncovered a sophisticated phishing campaign that combines two emerging attack techniques to bypass conventional security defenses. The…

New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
28
Oct
2025

New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs

A sophisticated Android banking trojan dubbed GhostGrab has emerged in the threat landscape, targeting financial institutions across multiple regions with…

XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer
28
Oct
2025

XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer

A critical remote code execution (RCE) flaw in XWiki, a popular open-source wiki platform, was exploited in the wild to…

BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers
28
Oct
2025

BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers

The BlueNoroff threat group, also tracked as Sapphire Sleet, APT38, and TA444, has significantly evolved its targeting capabilities with sophisticated…

Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies
28
Oct
2025

Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies

Mozilla is implementing a significant transparency requirement for Firefox extensions, mandating that all new browser add-ons disclose their data collection…

How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware Attacks
28
Oct
2025

How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware Attacks

Organizations today face constant threats from malware, including ransomware, phishing attacks, and zero-day exploits. These threats are evolving faster than…

New Gamaredon Phishing Attack Targeting Govt Entities Exploiting WinRAR Vulnerability
28
Oct
2025

New Gamaredon Phishing Attack Targeting Govt Entities Exploiting WinRAR Vulnerability

The cybersecurity landscape continues to evolve with increasingly sophisticated distribution mechanisms, and one trend gaining alarming momentum is the delivery…

Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System
28
Oct
2025

Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

IPFire 2.29 Core Update 198 marks a significant advancement for users of this open-source firewall, introducing enhanced Intrusion Prevention System…