Category: CyberSecurityNews

New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware
16
Sep
2025

New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware

Late in the summer of 2025, cybersecurity researchers uncovered a sophisticated spearphishing campaign targeting Ukrainian military personnel via the Signal…

Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
16
Sep
2025

Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace

Las Vegas, United States, September 16th, 2025, CyberNewsWire Seraphic today announced at Fal.Con 2025 that its Secure Enterprise Browser (SEB)…

Why Real-Time Threat Intelligence Is Critical for Modern SOCs
16
Sep
2025

Why Real-Time Threat Intelligence Is Critical for Modern SOCs

Security Operations Centers (SOCs) exist under ever-increasing pressure to detect and respond to threats before they escalate. Today’s fast-moving adversaries…

RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT
16
Sep
2025

RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT

RevengeHotels, a financially motivated threat group active since 2015, has escalated its operations against hospitality organizations by integrating large language…

KillSec Ransomware Attacking Healthcare Industry IT Systems
16
Sep
2025

KillSec Ransomware Attacking Healthcare Industry IT Systems

The KillSec ransomware strain has rapidly emerged as a formidable threat targeting healthcare IT infrastructures across Latin America and beyond….

Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content
16
Sep
2025

Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content

Modern development workflows increasingly rely on AI-driven coding assistants to accelerate software delivery and improve code quality. However, recent research…

LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover
16
Sep
2025

LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover

A critical vulnerability has been discovered in LG’s WebOS for smart TVs, allowing an attacker on the same local network…

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login
16
Sep
2025

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login

A critical authentication bypass vulnerability in the Case Theme User WordPress plugin has emerged as a significant security threat, allowing…

New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment
16
Sep
2025

New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment

Attackers are increasingly leveraging sophisticated techniques to maintain long-term access in cloud environments, and a newly surfaced tool named AWSDoor…

AISURU Botnet With 300,000 Hijacked Routers Behind The Recent Massive 11.5 Tbps DDoS Attack
16
Sep
2025

AISURU Botnet With 300,000 Hijacked Routers Behind The Recent Massive 11.5 Tbps DDoS Attack

Since early 2025, the cybersecurity community has witnessed an unprecedented surge in distributed denial-of-service (DDoS) bandwidth, culminating in a record-shattering…

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues
16
Sep
2025

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues

Two critical vulnerabilities, CVE-2025-41248 and CVE-2025-41249, have emerged in Spring Security and Spring Framework that could allow attackers to bypass…

SmokeLoader Utilizes Optional Plugins To Perform Tasks Such as Stealing Data and DoS Attacks
16
Sep
2025

SmokeLoader Utilizes Optional Plugins To Perform Tasks Such as Stealing Data and DoS Attacks

SmokeLoader, first seen on criminal forums in 2011, has evolved into a highly modular malware loader designed to deliver a…