Category: CyberSecurityNews

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack
27
Oct
2025

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

HashiCorp has disclosed two critical vulnerabilities in its Vault software that could allow attackers to bypass authentication controls and launch…

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild
27
Oct
2025

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild

Hackers are actively exploiting a critical flaw in Microsoft’s Windows Server Update Services (WSUS), with security researchers reporting widespread attempts…

Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain
27
Oct
2025

Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain

The notorious cybercrime forum BreachForums has resurfaced online, this time on a clearnet domain accessible without specialized tools like Tor….

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System
27
Oct
2025

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System

Dell Technologies has disclosed three critical vulnerabilities in its Storage Manager software that could allow attackers to bypass authentication, disclose…

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
27
Oct
2025

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver

A new tool called EDR-Redir has emerged, allowing attackers to redirect or isolate the executable folders of popular Endpoint Detection…

27
Oct
2025

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver

A new tool called EDR-Redir has emerged, allowing attackers to redirect or isolate the executable folders of popular Endpoint Detection…

New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens
27
Oct
2025

New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens

A sophisticated phishing technique called CoPhish exploits Microsoft Copilot Studio to trick users into granting attackers unauthorized access to their…

5 Deception Solutions that are Changing the Cybersecurity Game 
26
Oct
2025

5 Deception Solutions that are Changing the Cybersecurity Game 

Cyber attackers are using new ways to breach systems, making threats hard to detect. Traditional tools like firewalls alone can’t keep up. …

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online
26
Oct
2025

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online

A high-severity vulnerability in BIND 9 resolvers has been disclosed, potentially allowing attackers to poison caches and redirect internet traffic…

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
26
Oct
2025

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments

The notorious LockBit ransomware operation has resurfaced with a vengeance after months of dormancy following Operation Cronos takedown efforts in…

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
26
Oct
2025

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting attackers complete control…

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
26
Oct
2025

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Southeast Asia’s online gambling ecosystem has become a breeding ground for sophisticated cyber threats, with criminal networks leveraging seemingly legitimate…