Category: CyberSecurityNews

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence
12
Sep
2025

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence

Since its first appearance earlier this year, the ToneShell backdoor has demonstrated a remarkable capacity for adaptation, toyed with by…

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code
12
Sep
2025

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Samsung has released its September 2025 security update, addressing a critical zero-day vulnerability that is being actively exploited in the…

K2 Think AI Model Jailbroken Within Hours After The Release
12
Sep
2025

K2 Think AI Model Jailbroken Within Hours After The Release

Within mere hours of its public unveiling, the K2 Think model experienced a critical compromise that has sent ripples throughout…

New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems
12
Sep
2025

New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems

In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya…

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2
12
Sep
2025

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2

A new kernel address leak vulnerability has been discovered in the latest versions of Windows 11 (24H2) and Windows Server…

New Clickfix Attack Promises "Free WiFi" But Delivers Powershell Based Malware
12
Sep
2025

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware

The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public’s need for free internet access,…

New Malware Using Azure Functions For Hosting Command And Control Infrastructure
12
Sep
2025

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

A new, sophisticated malware campaign has been uncovered that leverages Microsoft’s Azure Functions for its command-and-control (C2) infrastructure, a novel…

Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges
12
Sep
2025

Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges

Microsoft has addressed four elevation of privilege vulnerabilities in its Windows Defender Firewall service, all rated as “Important” in severity….

Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects
12
Sep
2025

Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects

Microsoft has officially announced a multi-phase plan to deprecate VBScript in Windows, a move that signals a significant shift for…

Apple Warns Of Series Mercenary Spyware Attacks Targeting Users Devices
12
Sep
2025

Apple Warns Of Series Mercenary Spyware Attacks Targeting Users Devices

Apple has issued a warning regarding highly sophisticated “mercenary spyware” attacks targeting a select group of its users. The company’s…

VirtualBox 7.2.2 Released With Fix For GUI Crashes On Virtual Machines (guests)
12
Sep
2025

VirtualBox 7.2.2 Released With Fix For GUI Crashes On Virtual Machines (guests)

Oracle has released VirtualBox 7.2.2, a maintenance update for its open-source virtualization platform, focusing on improving stability and addressing a…

Microsoft Exchange Online Outage for Users Accessing Email via Exchange Online Methods
12
Sep
2025

Microsoft Exchange Online Outage for Users Accessing Email via Exchange Online Methods

Microsoft is investigating a significant Exchange Online service disruption that is preventing users in North and South America from accessing…