Category: CyberSecurityNews

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
27
Aug
2025

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

A sophisticated new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that position it among the…

China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
27
Aug
2025

China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled

China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current…

Securden Unified PAM Vulnerability Let Attackers Bypass Authentication
27
Aug
2025

Securden Unified PAM Vulnerability Let Attackers Bypass Authentication

Cybersecurity researchers have uncovered a critical security flaw in Securden Unified PAM that allows attackers to completely bypass authentication mechanisms…

Google to Add New Layer of Developer Verification to Distribute Apps on Play Store
26
Aug
2025

Google to Add New Layer of Developer Verification to Distribute Apps on Play Store

Android’s open ecosystem has been both its greatest strength and a persistent security challenge. While sideloading offers developers and users…

AccuKnox Awarded Patent for Runtime Security of Kernel Events
26
Aug
2025

AccuKnox Awarded Patent for Runtime Security of Kernel Events

AccuKnox, a leader in Zero Trust Kubernetes and cloud-native security solutions, has been issued a patent [US Patent# 12,242,629 –…

New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials
26
Aug
2025

New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials

A sophisticated credential harvesting campaign has emerged targeting ScreenConnect cloud administrators with spear phishing attacks designed to steal super administrator…

First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
26
Aug
2025

First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

A new ransomware has been identified, which is believed to be the first-ever ransomware strain that leverages a local AI…

How SOCs Triage Incidents in Seconds with Threat Intelligence
26
Aug
2025

How SOCs Triage Incidents in Seconds with Threat Intelligence

When every minute counts, it’s important to have access to fresh threat intelligence at the tip of your finger. That’s…

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks
26
Aug
2025

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks

CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that enables arbitrary file writes via misconfigured…

Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks
26
Aug
2025

Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks

Cloud Software Group has disclosed multiple high-severity vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)…

Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V
26
Aug
2025

Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V

Microsoft has released a new VM Conversion extension for Windows Admin Center, designed to streamline the migration of VMware virtual…

Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It
26
Aug
2025

Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It

Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However, their cloud-based…