Category: CyberSecurityNews

APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods
24
Nov
2025

APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

In October 2025, a significant breach exposed the internal workings of APT35, also known as Charming Kitten, a cyber unit…

Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User
24
Nov
2025

Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User

Tenda N300 wireless routers and 4G03 Pro portable LTE devices face severe security threats from multiple command injection vulnerabilities that…

New EtherHiding Attack Uses Web-Based Attacks to Deliver Malware and Rotate Payloads
24
Nov
2025

New EtherHiding Attack Uses Web-Based Attacks to Deliver Malware and Rotate Payloads

A new threat known as EtherHiding is reshaping how malware spreads through the internet. Unlike older methods that rely on…

Zapier’s NPM Account Hacked - Multiple Packages Infected with Malware
24
Nov
2025

Zapier’s NPM Account Hacked – Multiple Packages Infected with Malware

A massive supply chain attack targeting the NPM accounts of automation giant Zapier and the Ethereum Name Service (ENS). Identified…

Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary
24
Nov
2025

Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary

Cybersecurity researchers have uncovered a sophisticated Python-based malware that employs process injection techniques to hide inside legitimate Windows binaries. This…

Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials
24
Nov
2025

Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials

A sophisticated phishing campaign is currently leveraging a subtle typographical trick to bypass user vigilance, deceiving victims into handing over…

vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads
24
Nov
2025

vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads

A critical memory corruption vulnerability in vLLM versions 0.10.2 and later allows attackers to achieve remote code execution through the…

Beware of North Korean Fake Job Platform Targeting U.S. Based AI-Developers
24
Nov
2025

Beware of North Korean Fake Job Platform Targeting U.S. Based AI-Developers

A sophisticated recruitment scam linked to North Korea has emerged, targeting American artificial intelligence developers, software engineers, and cryptocurrency professionals…

DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities
24
Nov
2025

DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities

A concerning vulnerability in DeepSeek-R1, a Chinese-developed artificial intelligence coding assistant. When the AI model encounters politically sensitive topics related…

Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet
24
Nov
2025

Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet

The Wireshark Foundation has rolled out a crucial security update for its widely used network protocol analyzer, addressing multiple vulnerabilities…

CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks
24
Nov
2025

CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations to immediately address a critical security flaw in Oracle Identity…

Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges
23
Nov
2025

Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges

A critical vulnerability in Azure Bastion (CVE-2025-49752) allows remote attackers to bypass authentication mechanisms and escalate privileges to administrative levels….