Category: CyberSecurityNews

FreePBX SQL Injection Vulnerability Exploited to Modify The Database
09
Oct
2025

FreePBX SQL Injection Vulnerability Exploited to Modify The Database

A critical SQL injection vulnerability in FreePBX has emerged as a significant threat to VoIP infrastructure worldwide, enabling attackers to…

Hackers Actively Compromising Databases Using Legitimate Commands
09
Oct
2025

Hackers Actively Compromising Databases Using Legitimate Commands

A sophisticated new breed of ransomware attacks is leveraging legitimate database commands to compromise organizations worldwide, bypassing traditional security measures…

Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances
09
Oct
2025

Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances

The notorious cybercriminal collective known as Scattered Lapsus$ Hunters has escalated their extortion campaign by launching a dedicated leak site…

Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware
08
Oct
2025

Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware

In recent weeks, cybersecurity analysts have observed a resurgence of the Mustang Panda threat actor deploying a novel DLL side-loading…

Miggo Security Named a Gartner® Cool Vendor in AI Security
08
Oct
2025

Miggo Security Named a Gartner® Cool Vendor in AI Security

Tel Aviv, Israel, October 8th, 2025, CyberNewsWire Miggo Security, pioneer and innovator in Application Detection & Response (ADR) and AI…

A Buyer’s Guide for CISOs
08
Oct
2025

A Buyer’s Guide for CISOs

Generative AI has gone from a novelty to a foundation of organization efficiency in just a few short years. From…

3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster 
08
Oct
2025

3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster 

Security teams are constantly on the move. Alerts never stop coming in, workloads keep piling up, and the pressure to…

Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server
08
Oct
2025

Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server

A sophisticated cyberattack campaign, active since August 2025, where a China-nexus threat actor has been weaponizing a legitimate server operations…

Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges
08
Oct
2025

Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges

A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to…

ClamAV 1.5.0 Released with New MS Office and PDF Verification Features
08
Oct
2025

ClamAV 1.5.0 Released with New MS Office and PDF Verification Features

Cisco has announced the release of ClamAV 1.5.0, a significant update to the open-source antivirus engine that introduces major security…

Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code
08
Oct
2025

Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code

Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and fixing vulnerabilities. This…

APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails
08
Oct
2025

APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails

A China-aligned advanced persistent threat (APT) group is actively leveraging OpenAI’s ChatGPT platform to develop malware and craft sophisticated spear-phishing…