Category: CyberSecurityNews

KillSec Ransomware Attacking Healthcare Industry IT Systems
16
Sep
2025

KillSec Ransomware Attacking Healthcare Industry IT Systems

The KillSec ransomware strain has rapidly emerged as a formidable threat targeting healthcare IT infrastructures across Latin America and beyond….

Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content
16
Sep
2025

Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content

Modern development workflows increasingly rely on AI-driven coding assistants to accelerate software delivery and improve code quality. However, recent research…

LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover
16
Sep
2025

LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover

A critical vulnerability has been discovered in LG’s WebOS for smart TVs, allowing an attacker on the same local network…

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login
16
Sep
2025

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login

A critical authentication bypass vulnerability in the Case Theme User WordPress plugin has emerged as a significant security threat, allowing…

New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment
16
Sep
2025

New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment

Attackers are increasingly leveraging sophisticated techniques to maintain long-term access in cloud environments, and a newly surfaced tool named AWSDoor…

AISURU Botnet With 300,000 Hijacked Routers Behind The Recent Massive 11.5 Tbps DDoS Attack
16
Sep
2025

AISURU Botnet With 300,000 Hijacked Routers Behind The Recent Massive 11.5 Tbps DDoS Attack

Since early 2025, the cybersecurity community has witnessed an unprecedented surge in distributed denial-of-service (DDoS) bandwidth, culminating in a record-shattering…

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues
16
Sep
2025

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues

Two critical vulnerabilities, CVE-2025-41248 and CVE-2025-41249, have emerged in Spring Security and Spring Framework that could allow attackers to bypass…

SmokeLoader Utilizes Optional Plugins To Perform Tasks Such as Stealing Data and DoS Attacks
16
Sep
2025

SmokeLoader Utilizes Optional Plugins To Perform Tasks Such as Stealing Data and DoS Attacks

SmokeLoader, first seen on criminal forums in 2011, has evolved into a highly modular malware loader designed to deliver a…

New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials
16
Sep
2025

New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials

Since May 2025, a novel credential stealer dubbed Maranhão Stealer has emerged as a significant threat to users of pirated…

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
16
Sep
2025

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence

A groundbreaking open-source benchmark suite called CyberSOCEval has emerged as the first comprehensive evaluation framework for Large Language Models (LLMs)…

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips
16
Sep
2025

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips

A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed….

Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads
16
Sep
2025

Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads

A sophisticated and widespread supply chain attack has struck the NPM ecosystem, compromising the popular @ctrl/tinycolor package, which is downloaded…