Category: CyberSecurityNews

Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication
15
Sep
2025

Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication

Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking
15
Sep
2025

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking

A new proof-of-concept (PoC) tool named BitlockMove demonstrates a novel lateral movement technique that leverages BitLocker’s Distributed Component Object Model…

FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration
14
Sep
2025

FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration

The Federal Bureau of Investigation (FBI) has released a flash alert detailing the activities of two cybercriminal groups, UNC6040 and…

New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
13
Sep
2025

New Malvertising Campaign Leverages GitHub Repository to Deliver Malware

A sophisticated malvertising campaign has emerged, exploiting GitHub repositories through dangling commits to distribute malware via fake GitHub Desktop clients….

EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
13
Sep
2025

EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections

A sophisticated malware campaign has emerged that leverages artificial intelligence to create deceptively legitimate applications, marking a significant evolution in…

Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints
13
Sep
2025

Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

A sophisticated backdoor malware known as Backdoor.WIN32.Buterat has emerged as a significant threat to enterprise networks, demonstrating advanced persistence techniques…

What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
13
Sep
2025

What Are The Takeaways from The Scattered Lapsus $Hunters Statement?

The well-known group of cybercriminals called Scattered Lapsus$ Hunters released a surprising farewell statement on BreachForums. This manifesto, a mix…

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT
13
Sep
2025

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Cybersecurity researchers have uncovered a sophisticated malware campaign that exploits SVG (Scalable Vector Graphics) files and email attachments to distribute…

ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email
13
Sep
2025

ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email

A newly introduced feature in ChatGPT that allows it to connect with personal data applications can be exploited by attackers…

Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently
12
Sep
2025

Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently

A sudden and definitive statement emerged from the “Scattered LAPSUS$ Hunters 4.0” Telegram channel on September 8, signaling an abrupt…

AI-powered Pentesting Tool 'Villager' Combines Kali Linux Tools with DeepSeek AI for Automated Attacks
12
Sep
2025

AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks

New AI-powered penetration testing framework Villager combines Kali Linux toolsets with DeepSeek AI models to fully automate cyber attack workflows….

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
12
Sep
2025

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

The notorious APT-C-24 threat actor group, commonly known as Sidewinder or Rattlesnake, has evolved its attack methodology by deploying sophisticated…