Category: CyberSecurityNews

New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages
24
Oct
2025

New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages

A sophisticated spearphishing campaign has emerged targeting humanitarian organizations and Ukrainian government agencies, leveraging weaponized PDF attachments and fake Cloudflare…

Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750
24
Oct
2025

Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750

The hacking community celebrated the end of Pwn2Own Ireland 2025. Researchers demonstrated their skills by identifying 73 unique zero-day vulnerabilities…

Amazon Uncovers Root Cause of Major AWS Outage That Brokes The Internet
24
Oct
2025

Amazon Uncovers Root Cause of Major AWS Outage That Brokes The Internet

Amazon Web Services (AWS), the backbone for countless websites and services, faced a severe outage last weekend that disrupted operations…

Toys "R" Us Canada Confirms Data Breach
24
Oct
2025

Toys “R” Us Canada Confirms Data Breach

Toys “R” Us Canada has alerted customers to a significant data breach that potentially exposed their personal information, marking another…

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters
24
Oct
2025

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Email phishing attacks have reached a critical inflection point in 2025, as threat actors deploy increasingly sophisticated evasion techniques to…

Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability
24
Oct
2025

Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability

Microsoft has rolled out an out-of-band emergency patch for a remote code execution (RCE) vulnerability affecting the Windows Server Update…

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
24
Oct
2025

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob Storage containers,…

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels
24
Oct
2025

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels

A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a…

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data
24
Oct
2025

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Microsoft 365 Exchange Online’s Direct Send feature, originally designed to enable legacy devices and applications to send emails without authentication,…

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data
24
Oct
2025

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data

The Bitter APT group, also tracked as APT-Q-37 and known in China as 蔓灵花, has launched a sophisticated cyberespionage campaign…

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
24
Oct
2025

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…

Hackers Can Gain Access to Microsoft Teams Chat and Emails by Retrieving Access Tokens
24
Oct
2025

Hackers Can Gain Access to Microsoft Teams Chat and Emails by Retrieving Access Tokens

A new technique allows hackers to extract encrypted authentication tokens from Microsoft Teams on Windows, enabling unauthorized access to chats,…