Category: CyberSecurityNews

New Text Message Based Phishing Attack from China Targeting Users Around the Globe
25
Oct
2025

New Text Message Based Phishing Attack from China Targeting Users Around the Globe

A sophisticated text message phishing campaign originating from China has emerged as one of the most extensive cybersecurity threats targeting…

Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks
25
Oct
2025

Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks

BitLocker keys without PIN protection, where attackers could exploit stolen laptops, researchers now delve into PIN-secured setups, targeting insider threats…

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
25
Oct
2025

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation of a critical remote code…

25
Oct
2025

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based obfuscation to evade traditional security…

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
25
Oct
2025

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics and fraudulent financial aid promises….

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
25
Oct
2025

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage operations targeting Linux-based systems of…

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
24
Oct
2025

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on digital gift card systems. The…

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
24
Oct
2025

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a…

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer
24
Oct
2025

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as a legitimate Minecraft client to…

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware
24
Oct
2025

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that leverages ClickOnce applications to deploy…

WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland
24
Oct
2025

WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland

At Pwn2Own Ireland 2025 hacking competition, cybersecurity researchers from Team Z3 have withdrawn their high-stakes demonstration of a potential zero-click…

MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
24
Oct
2025

MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations

The Advanced Persistent Threat group MuddyWater, widely recognized as an Iran-linked espionage actor, has orchestrated a sophisticated phishing campaign targeting…