Category: CyberSecurityNews

Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers
19
Nov
2025

Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers

A China-aligned threat group known as PlushDaemon has been weaponizing a sophisticated attack method to infiltrate networks across multiple regions…

How to Solve Alert Overload in Your SOC
19
Nov
2025

How to Solve Alert Overload in Your SOC

Your SOC generates thousands of alerts daily. Many of them are low-priority, repetitive, or false positives. On paper, this looks like a…

Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild
19
Nov
2025

Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild

Hackers have begun actively exploiting a critical remote code execution (RCE) vulnerability in the popular file archiver 7-Zip, putting millions…

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
19
Nov
2025

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Tel Aviv, Israel, November 19th, 2025, CyberNewsWire Seraphic, the leader in enterprise browser security (SEB) and AI enablement, today announced…

Go-to Tool for IT Admins, Security Pros, and Threat Hunters Coming to Windows
19
Nov
2025

Go-to Tool for IT Admins, Security Pros, and Threat Hunters Coming to Windows

Microsoft is bringing native Sysmon functionality directly into Windows, eliminating the need for manual deployment and separate downloads. Starting next year, Windows…

'The Gentlemen' Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data
19
Nov
2025

‘The Gentlemen’ Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data

A new ransomware threat named “The Gentlemen” has emerged in the cybersecurity landscape, demonstrating advanced attack capabilities and a well-structured…

Hackers Using Leverage Tuoni C2 Framework Tool to Stealthly Deliver In-Memory Payloads
19
Nov
2025

Hackers Using Leverage Tuoni C2 Framework Tool to Stealthly Deliver In-Memory Payloads

A new wave of cyberattacks has emerged using the Tuoni Command and Control (C2) framework, a sophisticated tool that allows…

New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data
19
Nov
2025

New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data

A new malware campaign targeting macOS users has emerged with a dangerous focus on cryptocurrency wallet theft. The malware, called…

Microsoft Investigation Copilot Issue On Processing Files 
19
Nov
2025

Microsoft Investigation Copilot Issue On Processing Files 

Microsoft has launched an investigation into a widespread issue affecting Microsoft Copilot in Microsoft 365, where users are experiencing significant…

Destructive Akira Ransomware Attack with a Single Click on CAPTCHA in Malicious Website
19
Nov
2025

Destructive Akira Ransomware Attack with a Single Click on CAPTCHA in Malicious Website

A global data storage and infrastructure company fell victim to a severe ransomware attack orchestrated by Howling Scorpius, the group…

New ShadowRay Attack Exploit Ray AI-Framework Vulnerability to Attack AI Systems
19
Nov
2025

New ShadowRay Attack Exploit Ray AI-Framework Vulnerability to Attack AI Systems

Cybersecurity researchers have uncovered an active global hacking campaign leveraging a known flaw in Ray, an open-source AI framework widely…

CISA Warns of Fortinet FortiWeb OS Command Injection Vulnerability Exploited in the Wild
19
Nov
2025

CISA Warns of Fortinet FortiWeb OS Command Injection Vulnerability Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical vulnerability affecting Fortinet FortiWeb appliances…