Category: CyberSecurityNews

Bridgestone Confirms Cyberattack Impacts Manufacturing Facilities
04
Sep
2025

Bridgestone Confirms Cyberattack Impacts Manufacturing Facilities

Tire manufacturing giant Bridgestone Americas has confirmed it is responding to a cyberattack that disrupted operations at some of its…

NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
04
Sep
2025

NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data

A sophisticated threat actor known as NoisyBear has emerged as a significant concern for Kazakhstan’s energy sector, employing advanced tactics…

Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers
04
Sep
2025

Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers

The Django development team has issued critical security updates to address a high-severity vulnerability that could allow attackers to execute…

Sendmarc appoints Rob Bowker as North American Region Lead
04
Sep
2025

Sendmarc appoints Rob Bowker as North American Region Lead

Wilmington, United States, September4th, 2025, CyberNewsWire: Veteran email security leader to expand MSP and VAR partnerships and accelerate DMARC adoption. …

GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results
04
Sep
2025

GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results

A newly identified hacking group, dubbed “GhostRedirector” by cybersecurity researchers, has compromised at least 65 Windows servers across the globe,…

Threat Actors Using Stealerium Malware to Attack Educational Organizations
04
Sep
2025

Threat Actors Using Stealerium Malware to Attack Educational Organizations

Educational institutions have become prime targets in the escalating battle against commodity information stealers. First emerging in 2022 as an…

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts
04
Sep
2025

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

A new cyber-attack, dubbed “Grokking,” is exploiting features on the social media platform X to spread malicious links on a…

Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions
04
Sep
2025

Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions

Microsoft has officially acknowledged a significant bug in recent Windows security updates that is causing application installation and repair failures…

Google Down For Most Of The Users In Turkey And Eastern Europe
04
Sep
2025

Google Down For Most Of The Users In Turkey And Eastern Europe

A significant outage of Google services, including its search engine, Gmail, and YouTube, has affected users across Turkey and several…

US Offers $10M Bounty For FSB Hackers Who Exploited Cisco Vulnerability To Attack Critical Infrastructure
04
Sep
2025

US Offers $10M Bounty For FSB Hackers Who Exploited Cisco Vulnerability To Attack Critical Infrastructure

The United States government has announced a reward of up to $10 million for information leading to the identification or…

XWorm Malware With New Infection Chain Evade Detection Exploiting User and System Trust
04
Sep
2025

XWorm Malware With New Infection Chain Evade Detection Exploiting User and System Trust

Emerging quietly in mid-2025, the XWorm backdoor has evolved into a deceptively sophisticated threat that preys on both user confidence…

Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses
04
Sep
2025

Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses

A sprawling network of illicit Internet Protocol Television (IPTV) services has been discovered, operating across more than 1,100 domains and…