Category: CyberSecurityNews

New Android Spyware Disguised as an Antivirus Attacking Business Executives
25
Aug
2025

New Android Spyware Disguised as an Antivirus Attacking Business Executives

In recent months, security teams have observed the emergence of a highly versatile Android backdoor, Android.Backdoor.916.origin, masquerading as a legitimate…

Hackers Using PUP Advertisements to Silently Drop Windows Malware
25
Aug
2025

Hackers Using PUP Advertisements to Silently Drop Windows Malware

In recent weeks, cybersecurity investigators have uncovered a novel campaign in which hackers leverage seemingly benign potentially unwanted program (PUP)…

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
25
Aug
2025

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

A sophisticated campaign of cyber sabotage unfolded against Iran’s maritime communications infrastructure in late August 2025, cutting off dozens of…

Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
25
Aug
2025

Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Cybersecurity researchers have observed a surge in deceptive sites masquerading as YouTube video download services to deliver Proxyware malware in…

Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure
25
Aug
2025

Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure

In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging commercial…

Kimsuky APT Data Leak - GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
25
Aug
2025

Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered

In late June 2025, a significant operational dump from North Korea’s Kimsuky APT group surfaced on a dark-web forum, exposing…

5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them
25
Aug
2025

5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them

As students return to campus and online learning platforms, cybercriminals are increasingly leveraging artificial intelligence to create sophisticated scams targeting…

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes
25
Aug
2025

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

A comprehensive security analysis of vtenext CRM version 25.02 has revealed multiple critical vulnerabilities that allow unauthenticated attackers to bypass…

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization - GBHackers Security
25
Aug
2025

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization

Dover, DE, United States, August 25th, 2025, CyberNewsWire Attaxion announces the addition of the Agentless Traffic Monitoring capability to its…

KorPlug Malware Unmasked - TTPs, Control Flow, IOCs Exposed
25
Aug
2025

KorPlug Malware Unmasked – TTPs, Control Flow, IOCs Exposed

A sophisticated malware strain known as KorPlug has emerged as a significant threat in the cybersecurity landscape, employing advanced obfuscation…

New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies
25
Aug
2025

New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies

Microsoft is rolling out a significant new administrative control feature in mid-September 2025 that will enable IT administrators to manage…

New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection
24
Aug
2025

New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection

Phishing has always been about deceiving people. But in this campaign, the attackers weren’t only targeting users; they also attempted…