Category: CyberSecurityNews

PoC Exploit Released for 7-Zip Vulnerabilities that Let Attackers Execute Arbitrary Code Remotely
18
Oct
2025

PoC Exploit Released for 7-Zip Vulnerabilities that Let Attackers Execute Arbitrary Code Remotely

A proof-of-concept exploit for two critical vulnerabilities in the popular file archiver 7-Zip, potentially allowing attackers to execute arbitrary code…

Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards
18
Oct
2025

Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards

An international law enforcement operation has dismantled a large-scale cybercrime-as-a-service network responsible for fueling thousands of online fraud cases across…

Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data
18
Oct
2025

Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data

A newly disclosed Server-Side Request Forgery (SSRF) flaw in Zimbra Collaboration Suite has raised major security concerns, prompting administrators to…

Hackers Using AI to Automate Vulnerability Discovery and Malware Generation
17
Oct
2025

Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Security teams around the world are grappling with a new breed of cyber threats that leverage advanced automation to identify…

Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
17
Oct
2025

Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections

Microsoft’s October 2025 cumulative update for Windows 11 has disrupted localhost functionality, preventing developers and users from accessing local web…

Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
17
Oct
2025

Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution

Cybercriminals are exploiting TikTok’s massive user base to distribute sophisticated malware campaigns that promise free software activation but deliver dangerous…

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
17
Oct
2025

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware

Cybercriminals associated with the North Korean threat group WaterPlum, also known as Famous Chollima or PurpleBravo, have escalated their activities…

ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates
17
Oct
2025

ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates

ConnectWise released a critical security update for its Automate platform on October 16, 2025. The patch, version 2025.9, addresses serious…

New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials
17
Oct
2025

New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials

A new campaign has emerged that weaponizes Microsoft’s familiar branding to lure unsuspecting users into a sophisticated tech support scam….

Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error
17
Oct
2025

Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error

A vulnerability in Microsoft’s newly implemented Rust-based kernel component for the Graphics Device Interface (GDI) in Windows. This flaw, which…

APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules
17
Oct
2025

APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules

Russia’s APT28 has resurfaced in mid-2025 with a sophisticated spear-phishing campaign that weaponizes Office documents to deploy two novel payloads:…

LinkPro Rootkit Attacking GNU/Linux Systems Using eBPF Module to Hide Malicious Activities
17
Oct
2025

LinkPro Rootkit Attacking GNU/Linux Systems Using eBPF Module to Hide Malicious Activities

A sophisticated rootkit targeting GNU/Linux systems has emerged, leveraging advanced eBPF (extended Berkeley Packet Filter) technology to conceal malicious activities…