Category: CyberSecurityNews

Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise
26
Sep
2025

Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise

Active Directory (AD) remains the foundation of authentication and authorization in Windows environments. Threat actors targeting the NTDS.dit database can harvest…

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild
26
Sep
2025

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild

CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day vulnerabilities, CVE-2025-20333 and CVE-2025-20362, actively exploited against Cisco Adaptive Security…

Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data
26
Sep
2025

Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data

In late 2024, a new wave of cyber espionage emerged targeting global telecommunications infrastructure. Operating under the moniker Salt Typhoon,…

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys
26
Sep
2025

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

Cybercriminals have launched a sophisticated supply chain attack targeting cryptocurrency developers through malicious Rust crates designed to steal digital wallet…

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers
26
Sep
2025

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers

Cisco warns of a Critical remote code execution flaw in web services across multiple Cisco platforms.  Tracked as CVE-2025-20363 (CWE-122),…

Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware
26
Sep
2025

Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware

Cybersecurity authorities are urging organizations to take immediate action following the discovery of a sophisticated espionage campaign targeting Cisco Adaptive…

Hackers Leverage AI-Generated Code to Obfuscate Its Payload and Evade Traditional Defenses
26
Sep
2025

Hackers Leverage AI-Generated Code to Obfuscate Its Payload and Evade Traditional Defenses

Cybercriminals are increasingly turning to artificial intelligence to enhance their attack capabilities, as demonstrated in a sophisticated phishing campaign recently…

Cisco ASA 0-Day RCE Vulnerability Actively Exploited in the Wild
26
Sep
2025

Cisco ASA 0-Day RCE Vulnerability Actively Exploited in the Wild

Cisco has issued an emergency security advisory warning of active exploitation of a critical zero-day vulnerability in its Secure Firewall…

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor
26
Sep
2025

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor

In mid-2024, cybersecurity professionals began observing a surge of targeted intrusions against government, defense, and technology organizations worldwide. These incidents…

New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials
26
Sep
2025

New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials

A sophisticated phishing campaign has emerged targeting maintainers of packages on the Python Package Index (PyPI), employing domain confusion tactics…

Threat Actor’s Using Copyright Takedown Claims to Deploy Malware
26
Sep
2025

Threat Actor’s Using Copyright Takedown Claims to Deploy Malware

A sophisticated malware campaign orchestrated by the Vietnamese Lone None threat actor group has been leveraging fraudulent copyright infringement takedown…

Hackers Injecting Exploiting WordPress Websites With Silent Malware to Gain Admin Access
26
Sep
2025

Hackers Injecting Exploiting WordPress Websites With Silent Malware to Gain Admin Access

A sophisticated malware campaign targeting WordPress websites has been discovered employing advanced steganographic techniques and persistent backdoor mechanisms to maintain…