Category: CyberSecurityNews

TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations
05
Sep
2025

TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

A sophisticated new threat actor designated TAG-150 has emerged as a significant cybersecurity concern, demonstrating rapid development capabilities and technical…

Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations
05
Sep
2025

Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations

A sophisticated cyber campaign has emerged targeting U.S.-based organizations through trojanized ConnectWise ScreenConnect installers, marking a significant evolution in remote…

Wealthsimple Data Breach Exposes Personal Information of Some Users
05
Sep
2025

Wealthsimple Data Breach Exposes Personal Information of Some Users

Canadian fintech giant Wealthsimple announced today that it has suffered a data breach, resulting in the unauthorized access of personal…

Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer
05
Sep
2025

Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer

A sophisticated cyber campaign is targeting macOS users by distributing the potent “Odyssey” information stealer through a deceptive website impersonating…

New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
05
Sep
2025

New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers

A recently discovered strain of cryptomining malware has captured the attention of security teams worldwide by abusing the built-in Windows…

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign
05
Sep
2025

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign

Cybercriminals are increasingly exploiting the trust organizations place in artificial intelligence platforms to conduct sophisticated phishing attacks, according to a…

North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets
05
Sep
2025

North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets

Over the past year, cybersecurity researchers have observed a surge in activity from North Korean threat actors leveraging military-grade social…

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode
05
Sep
2025

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

A critical, zero-click vulnerability that allows attackers to hijack online accounts by exploiting how web applications handle international email addresses….

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System
05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

A critical vulnerability in SAP S/4HANA is being actively exploited in the wild, allowing attackers with low-level user access to…

05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

A critical vulnerability in SAP S/4HANA is being actively exploited in the wild, allowing attackers with low-level user access to…

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks
05
Sep
2025

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks

CISA has issued an urgent alert regarding a zero-day vulnerability in the Android operating system that is being actively exploited…

05
Sep
2025

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

A critical, zero-click vulnerability that allows attackers to hijack online accounts by exploiting how web applications handle international email addresses….