Category: CyberSecurityNews

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts
04
Sep
2025

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

A new cyber-attack, dubbed “Grokking,” is exploiting features on the social media platform X to spread malicious links on a…

Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions
04
Sep
2025

Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions

Microsoft has officially acknowledged a significant bug in recent Windows security updates that is causing application installation and repair failures…

Google Down For Most Of The Users In Turkey And Eastern Europe
04
Sep
2025

Google Down For Most Of The Users In Turkey And Eastern Europe

A significant outage of Google services, including its search engine, Gmail, and YouTube, has affected users across Turkey and several…

US Offers $10M Bounty For FSB Hackers Who Exploited Cisco Vulnerability To Attack Critical Infrastructure
04
Sep
2025

US Offers $10M Bounty For FSB Hackers Who Exploited Cisco Vulnerability To Attack Critical Infrastructure

The United States government has announced a reward of up to $10 million for information leading to the identification or…

XWorm Malware With New Infection Chain Evade Detection Exploiting User and System Trust
04
Sep
2025

XWorm Malware With New Infection Chain Evade Detection Exploiting User and System Trust

Emerging quietly in mid-2025, the XWorm backdoor has evolved into a deceptively sophisticated threat that preys on both user confidence…

Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses
04
Sep
2025

Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses

A sprawling network of illicit Internet Protocol Television (IPTV) services has been discovered, operating across more than 1,100 domains and…

Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments
04
Sep
2025

Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments

Over the past several years, a concerted campaign by Chinese state-sponsored Advanced Persistent Threat (APT) groups has exploited critical vulnerabilities…

Threat Actors Attack PayPal Users in New Account Profile Set up Scam
04
Sep
2025

Threat Actors Attack PayPal Users in New Account Profile Set up Scam

A sophisticated phishing campaign targeting PayPal’s massive user base has emerged, utilizing deceptive “Set up your account profile” emails to…

New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face
04
Sep
2025

New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face

Cybersecurity researchers have uncovered a critical vulnerability in the artificial intelligence supply chain that enables attackers to achieve remote code…

1,100 Ollama AI Servers Exposed to Internet With 20% of Them are Vulnerable
04
Sep
2025

1,100 Ollama AI Servers Exposed to Internet With 20% of Them are Vulnerable

A comprehensive security investigation has uncovered a disturbing reality in the artificial intelligence infrastructure landscape: more than 1,100 instances of…

Google Won’t Be Forced to Sell Chrome, But Must Share Search Data With Rivals
04
Sep
2025

Google Won’t Be Forced to Sell Chrome, But Must Share Search Data With Rivals

The U.S. District Court for the District of Columbia has ordered Google to share critical search data with competitors while…

CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
03
Sep
2025

CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning about a critical vulnerability in SunPower PVS6…