Category: CyberSecurityNews

Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials
17
Nov
2025

Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials

A threat actor known as “888” has purportedly dumped sensitive data stolen from electronics giant LG Electronics, raising alarms in…

Alice Blue Partners With AccuKnox For Regulatory Compliance
17
Nov
2025

Alice Blue Partners With AccuKnox For Regulatory Compliance

AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms(CNAPP), today announced its partnership with Alice Blue India, a…

Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser
17
Nov
2025

Hackers Use Rogue MCP Server to Inject Malicious Code to Control Over Cursor’s Built-in Browser

A critical vulnerability allowing attackers to inject malicious code into Cursor’s embedded browser through compromised MCP (Model Context Protocol) servers….

Network Communication Blocker Tool That Neutralizes EDR/AV
16
Nov
2025

Network Communication Blocker Tool That Neutralizes EDR/AV

A new open-source tool called SilentButDeadly has emerged, designed to disrupt Endpoint Detection and Response (EDR) and antivirus (AV) software…

Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
15
Nov
2025

Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges

A serious security flaw in Cisco Catalyst Center Virtual Appliance has been discovered that allows attackers with low-level access to…

PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
15
Nov
2025

PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild

A proof-of-concept (PoC) exploit tool for CVE-2025-64446 has been publicly released on GitHub. This vulnerability, affecting FortiWeb devices from Fortinet,…

RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools
15
Nov
2025

RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

A new threat targeting Chinese users has appeared with a dangerous ability to shut down security tools. RONINGLOADER, a multi-stage…

Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
15
Nov
2025

Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers

A severe remote code execution (RCE) flaw has been uncovered in pgAdmin4, the popular open-source interface for PostgreSQL databases. Dubbed…

First Large-scale Cyberattack Using AI With Minimal Human Input
15
Nov
2025

First Large-scale Cyberattack Using AI With Minimal Human Input

Chinese government-backed hackers used Anthropic’s Claude Code tool to carry out advanced spying on about thirty targets worldwide, successfully breaking…

A piece of the code inside the vbs file with the last line commented out (Source - Malwarebytes)
15
Nov
2025

Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials

Attackers are using fake invoice emails to spread XWorm, a remote-access trojan that quietly steals login credentials, passwords, and sensitive…

Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection
15
Nov
2025

Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection

A new malware family targeting macOS systems has emerged with advanced detection evasion techniques and multi-stage attack chains. Named DigitStealer,…

A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection
15
Nov
2025

A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection

Phishing attacks continue to be one of the most persistent threats targeting organizations worldwide. Cybercriminals are constantly improving their methods…