Category: CyberSecurityNews

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware
27
Sep
2025

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

A sophisticated malvertising campaign is using fake Microsoft Teams installers to compromise corporate systems, leveraging poisoned search engine results and…

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users
27
Sep
2025

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

A critical security flaw has emerged in Apache Airflow 3.0.3, exposing sensitive connection information to users with only read permissions….

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
27
Sep
2025

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads

A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices across the globe. The campaign…

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups
27
Sep
2025

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups

The cybersecurity landscape continues to evolve as three of the most notorious English-speaking cybercrime groups—LAPSUS$, Scattered Spider, and ShinyHunters—have been…

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
27
Sep
2025

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins

A new wave of cyberattacks targeting organizations using SonicWall firewalls has been actively deploying Akira ransomware since late July 2025….

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach
27
Sep
2025

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach

LummaStealer has emerged as one of the most prolific information-stealing malware families in recent years, targeting victims across multiple industry…

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released
27
Sep
2025

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released

A 17-year-old suspect who surrendered over his alleged role in the 2023 cyberattacks against two major Las Vegas casino operators…

LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft
26
Sep
2025

LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft

A sophisticated new threat has emerged in the cybersecurity landscape that represents a significant evolution in malware development. The LAMEHUG…

New Variant of The XCSSET Malware Attacking macOS App Developers
26
Sep
2025

New Variant of The XCSSET Malware Attacking macOS App Developers

The macOS threat landscape has witnessed a significant escalation with the discovery of a new variant of the XCSSET malware…

GitLab High-Severity Vulnerabilities Let Attackers Crash Instances
26
Sep
2025

GitLab High-Severity Vulnerabilities Let Attackers Crash Instances

GitLab has disclosed multiple high-severity Denial-of-Service (DoS) vulnerabilities that could allow unauthenticated attackers to crash self-managed GitLab instances.  These flaws…

Fortra GoAnywhere Vulnerability Exploited as 0-day Before Patch Released
26
Sep
2025

Fortra GoAnywhere Vulnerability Exploited as 0-day Before Patch Released

A critical, perfect 10.0 CVSS score vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution was actively exploited as a…

First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents
26
Sep
2025

First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents

The first-ever malicious Model-Context-Prompt (MCP) server discovered in the wild, a trojanized npm package named postmark-mcp that has been secretly…