Category: CyberSecurityNews

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets
25
Aug
2025

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets

A critical security vulnerability has been discovered in Zendesk’s Android SDK implementation that allows attackers to perform mass account takeovers…

Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware
25
Aug
2025

Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware

A novel adaptation of the ClickFix social engineering technique has been identified, leveraging invisible prompt injection to weaponize AI summarization…

Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware
25
Aug
2025

Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware

A sophisticated Android malware campaign has resurfaced, exploiting deceptive websites that perfectly mimic legitimate Google Play Store application pages to…

New Android Spyware Disguised as an Antivirus Attacking Business Executives
25
Aug
2025

New Android Spyware Disguised as an Antivirus Attacking Business Executives

In recent months, security teams have observed the emergence of a highly versatile Android backdoor, Android.Backdoor.916.origin, masquerading as a legitimate…

Hackers Using PUP Advertisements to Silently Drop Windows Malware
25
Aug
2025

Hackers Using PUP Advertisements to Silently Drop Windows Malware

In recent weeks, cybersecurity investigators have uncovered a novel campaign in which hackers leverage seemingly benign potentially unwanted program (PUP)…

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
25
Aug
2025

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

A sophisticated campaign of cyber sabotage unfolded against Iran’s maritime communications infrastructure in late August 2025, cutting off dozens of…

Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
25
Aug
2025

Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Cybersecurity researchers have observed a surge in deceptive sites masquerading as YouTube video download services to deliver Proxyware malware in…

Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure
25
Aug
2025

Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure

In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging commercial…

Kimsuky APT Data Leak - GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
25
Aug
2025

Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered

In late June 2025, a significant operational dump from North Korea’s Kimsuky APT group surfaced on a dark-web forum, exposing…

5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them
25
Aug
2025

5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them

As students return to campus and online learning platforms, cybercriminals are increasingly leveraging artificial intelligence to create sophisticated scams targeting…

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes
25
Aug
2025

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

A comprehensive security analysis of vtenext CRM version 25.02 has revealed multiple critical vulnerabilities that allow unauthenticated attackers to bypass…

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization - GBHackers Security
25
Aug
2025

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization

Dover, DE, United States, August 25th, 2025, CyberNewsWire Attaxion announces the addition of the Agentless Traffic Monitoring capability to its…