Category: CyberSecurityNews

Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks
08
Oct
2025

Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks

Google has released Chrome version 141.0.7390.65/.66 for Windows and Mac, along with 141.0.7390.65 for Linux, addressing multiple critical security vulnerabilities…

BK Technologies Data Breach - Hackers Compromise IT Systems and Exfiltrate Data
07
Oct
2025

BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data

BK Technologies Corporation, a provider of communications equipment for public safety and government agencies, has disclosed a cybersecurity incident in…

Why Threat Prioritization Is the Key SOC Performance Driver  
07
Oct
2025

Why Threat Prioritization Is the Key SOC Performance Driver  

CISOs face a paradox in their SOCs every day: more data and detections than ever before, yet limited capacity to…

Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
07
Oct
2025

Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware

Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing the features and capabilities of…

Researchers Reversed Asgard Malware Protector to Uncover it’s Antivirus Bypass Techniques
07
Oct
2025

Researchers Reversed Asgard Malware Protector to Uncover it’s Antivirus Bypass Techniques

In recent months, security researchers have turned their attention to Asgard Protector, a sophisticated crypter employed by cybercriminals to obfuscate…

Why Cross-Training in Networking and Cybersecurity Matters
07
Oct
2025

Why Cross-Training in Networking and Cybersecurity Matters

Raleigh, United States, October 7th, 2025, CyberNewsWire Report Shows Cross-Training as Strategic Solution to Operational Friction Between Networking and Cybersecurity…

Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses
07
Oct
2025

Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses

Ransomware operators have shifted from opportunistic malware distribution to highly targeted campaigns that exploit legitimate software for stealth and persistence….

New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors
07
Oct
2025

New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors

A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a sophisticated eavesdropping device. Researchers have…

CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day
07
Oct
2025

CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day

A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as CVE-2025-61882.  First…

Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal
07
Oct
2025

Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal

The WARMCOOKIE backdoor first surfaced in mid-2024, delivered primarily via recruiting-themed phishing campaigns that coaxed victims into executing malicious documents….

Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass
07
Oct
2025

Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass

Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…

Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials
07
Oct
2025

Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials

Elastic has released a security advisory detailing a medium-severity vulnerability in the Kibana CrowdStrike Connector that could allow for the…