Category: CyberSecurityNews

Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code
22
Oct
2025

Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code

A critical argument injection flaw in three unnamed popular AI agent platforms enables attackers to bypass human approval safeguards and…

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies
22
Oct
2025

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies

China-based threat actors have exploited the critical ToolShell vulnerability in Microsoft SharePoint servers to infiltrate networks across multiple continents, targeting…

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique
22
Oct
2025

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique

When users authenticate to Microsoft cloud services, their activities generate authentication events recorded across multiple logging systems. Microsoft Entra sign-in…

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials
22
Oct
2025

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials

A sophisticated phishing kit dubbed Tykit, which impersonates Microsoft 365 login pages to harvest corporate credentials. First detected in May…

Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts
22
Oct
2025

Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts

Since its emergence in August 2022, Lumma Infostealer has rapidly become a cornerstone of malware-as-a-service platforms, enabling even unskilled threat…

Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition
22
Oct
2025

Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

GitLab has urgently released patch versions 18.5.1, 18.4.3, and 18.3.5 for its Community Edition (CE) and Enterprise Edition (EE) to…

Critical Vulnerability In Oracle E-Business Suite's Marketing Product Allows Full Access To Attackers
22
Oct
2025

Critical Vulnerability In Oracle E-Business Suite’s Marketing Product Allows Full Access To Attackers

Oracle has disclosed two critical vulnerabilities in its E-Business Suite’s Marketing product that could hand full control to remote attackers….

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams
22
Oct
2025

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Security flaws in Microsoft’s Azure ecosystem enable cybercriminals to create deceptive applications that imitate official services like the “Azure Portal….

Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums
22
Oct
2025

Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums

Monolock ransomware has surfaced in underground forums, with threat actors advertising version 1.0 for sale alongside stolen corporate credentials. First…

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace
22
Oct
2025

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace

Over the past week, cybersecurity professionals have been gripped by the emergence of GlassWorm, a highly sophisticated, self-propagating malware campaign…

Hackers Abuse ASP.NET Machine Keys To Compromise IIS Servers And Deploy Malicious Modules
22
Oct
2025

Hackers Abuse ASP.NET Machine Keys To Compromise IIS Servers And Deploy Malicious Modules

A sneaky hacking campaign where attackers used publicly available ASP.NET machine keys to break into Windows IIS web servers. These…

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
22
Oct
2025

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

A critical authorization bypass vulnerability has emerged in ZYXEL’s ATP and USG series network security appliances, allowing attackers to circumvent…