Category: CyberSecurityNews

Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records
13
Oct
2025

Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records

Scattered Lapsus$ Hunters, a threat group previously associated with high-profile data thefts, recently claimed responsibility for exfiltrating over one billion…

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices
13
Oct
2025

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices

The cybersecurity landscape witnessed a concerning development as threat actors discovered a novel attack vector targeting Microsoft Edge’s Internet Explorer…

Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window
13
Oct
2025

Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window

Linus Torvalds has announced the release of Linux 6.18-rc1, marking the start of the release candidate phase for the upcoming…

North Korean Hackers Attacking Developers with 338 Malicious npm Packages
13
Oct
2025

North Korean Hackers Attacking Developers with 338 Malicious npm Packages

North Korean state-sponsored threat actors have intensified their supply chain attacks against software developers through a sophisticated campaign dubbed “Contagious…

New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials
13
Oct
2025

New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials

Security researchers have identified a sophisticated malware campaign that exploits WhatsApp’s messaging platform to deploy banking trojans targeting Brazilian financial…

PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation
13
Oct
2025

PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation

A critical vulnerability in Lenovo’s Dispatcher drivers has come under the spotlight after researchers released a proof-of-concept exploit that demonstrates…

New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data
13
Oct
2025

New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data

A critical vulnerability in AMD’s Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP), a cornerstone of confidential computing deployed by…

Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity
13
Oct
2025

Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity

New research uncovers valuable insights hidden within Microsoft Intune’s Mobile Device Management (MDM) certificates, offering a more reliable way to…

Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations
13
Oct
2025

Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations

A new wave of the Astaroth banking trojan has emerged, leveraging a novel approach to distribute its malicious configuration files….

Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages
13
Oct
2025

Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages

Cybercriminals have discovered a novel way to co-opt Discord webhooks as surrogate command-and-control (C2) channels across popular language ecosystems. Unlike…

EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed
13
Oct
2025

EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed

A recent analysis from researcher Itamar Hällström has revealed the technical workings and forensic trail of “EDR-Freeze,” a proof-of-concept technique…

New Stealit Malware Attacking Windows Systems Abuses Node.js Extensions
13
Oct
2025

New Stealit Malware Attacking Windows Systems Abuses Node.js Extensions

A sophisticated new malware campaign targeting Windows systems has emerged, leveraging Node.js Single Executable Application (SEA) features to distribute malicious…