Category: CyberSecurityNews

Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks
17
Nov
2025

Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks

As artificial intelligence infrastructure rapidly expands, critical security flaws threaten the backbone of enterprise AI deployments. Security researchers at Oligo…

TaskHound Tool - Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials
17
Nov
2025

TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials

A new open-source security tool, TaskHound, helps penetration testers and security professionals identify high-risk Windows scheduled tasks that could expose systems…

CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access
17
Nov
2025

CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access

CISA has issued an urgent alert about a critical vulnerability in Fortinet’s FortiWeb Web Application Firewall (WAF), actively exploited by…

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks
17
Nov
2025

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

A new phishing campaign has emerged that weaponizes Microsoft Entra guest user invitations to deceive recipients into making phone calls…

EVALUSION Campaign Using ClickFix Technique to deploy Amatera Stealer and NetSupport RAT
17
Nov
2025

EVALUSION Campaign Using ClickFix Technique to deploy Amatera Stealer and NetSupport RAT

In November 2025, a new malware campaign emerged that combines social engineering tricks with advanced stealing tools. The attack starts…

Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware
17
Nov
2025

Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Outlook NotDoor backdoor malware first appeared in threat campaigns identified by Lab52, the intelligence arm of Spanish firm S2 Grupo….

New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data
17
Nov
2025

New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data

A sandbox escape vulnerability affecting iPhones and iPads running iOS 16.2 beta 1 or earlier versions. The proof-of-concept (POC) exploits…

North Korean Hackers Infiltrated 136 U.S. Companies to Generate $2.2 Million in Revenue
17
Nov
2025

North Korean Hackers Infiltrated 136 U.S. Companies to Generate $2.2 Million in Revenue

The U.S. Justice Department announced major actions against North Korean cybercrime, including five people admitting guilt and the government taking…

Hackers Exploiting XWiki Vulnerability in the Wild to Hire the Servers for Botnet
17
Nov
2025

Hackers Exploiting XWiki Vulnerability in the Wild to Hire the Servers for Botnet

A sharp increase in attacks targeting a critical vulnerability in XWiki servers. Multiple threat actors are actively exploiting CVE-2025-24893 to deploy botnets…

Unremovable Spyware on Samsung Devices Comes Pre-installed on Galaxy Series Devices
17
Nov
2025

Unremovable Spyware on Samsung Devices Comes Pre-installed on Galaxy Series Devices

Samsung has been accused of shipping budget Galaxy A and M series smartphones with pre-installed spyware that users can’t easily…

Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials
17
Nov
2025

Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials

A threat actor known as “888” has purportedly dumped sensitive data stolen from electronics giant LG Electronics, raising alarms in…

Alice Blue Partners With AccuKnox For Regulatory Compliance
17
Nov
2025

Alice Blue Partners With AccuKnox For Regulatory Compliance

AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms(CNAPP), today announced its partnership with Alice Blue India, a…