Category: CyberSecurityNews

AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness
04
Nov
2025

AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness

AMD has disclosed a critical vulnerability affecting its Zen 5 processor lineup that compromises the reliability of random number generation,…

Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare
04
Nov
2025

Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare

The Open VSX Registry and the Eclipse Foundation have completed their investigation into a significant security incident involving exposed developer…

Apple Patches Multiple Critical Vulnerabilities in iOS 26.1 and iPadOS 26.1
04
Nov
2025

Apple Patches Multiple Critical Vulnerabilities in iOS 26.1 and iPadOS 26.1

Apple released iOS 26.1 and iPadOS 26.1, addressing multiple vulnerabilities that could lead to privacy breaches, app crashes, and potential…

New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
04
Nov
2025

New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts

Identity compromise has become one of the most significant threats facing cloud infrastructure, particularly when attackers gain access to legitimate…

Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
03
Nov
2025

Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025

In a recent setback for Windows administrators, Microsoft’s October 2025 security update addressing a critical vulnerability in Windows Server Update…

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
03
Nov
2025

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Hackers can exploit Anthropic’s Claude AI to steal sensitive user data. By leveraging the model’s newly added network capabilities in…

03
Nov
2025

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Hackers can exploit Anthropic’s Claude AI to steal sensitive user data. By leveraging the model’s newly added network capabilities in…

Conti Group Member Responsible for Deploying Ransomware Extradited to USA
03
Nov
2025

Conti Group Member Responsible for Deploying Ransomware Extradited to USA

A Ukrainian national accused of playing a key role in the notorious Conti ransomware operation has been extradited from Ireland…

03
Nov
2025

Beware of New Phishing Attack that Abuses Cloudflare and ZenDesk Pages to Steal Logins

A sophisticated phishing campaign has emerged, exploiting the trust placed in legitimate cloud hosting services. Threat actors are leveraging Cloudflare…

New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
03
Nov
2025

New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach

Supply chain attacks targeting the JavaScript ecosystem have evolved into sophisticated operations combining domain manipulation with social engineering. On September…

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure
03
Nov
2025

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure

Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one…

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
03
Nov
2025

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files

In October 2025, threat researchers at Cyble Research and Intelligence Labs uncovered a sophisticated cyber attack leveraging weaponized military documents…