Category: CyberSecurityNews

Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk
07
Oct
2025

Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk

A sophisticated cyberattack has compromised Red Hat Consulting’s infrastructure, potentially exposing sensitive data from over 5,000 enterprise customers worldwide. The…

GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware
07
Oct
2025

GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware

A critical deserialization flaw in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035, has already been weaponized by the Storm-1175 group…

CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks
07
Oct
2025

CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

CISA has issued an urgent security advisory, adding Microsoft Windows privilege escalation vulnerability CVE-2021-43226 to its Known Exploited Vulnerabilities (KEV)…

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code
07
Oct
2025

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code

A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve…

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild
07
Oct
2025

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild

Oracle has issued an emergency security alert for a critical zero-day vulnerability (CVE-2025-61882) in its E-Business Suite after the notorious…

13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System
07
Oct
2025

13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System

A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed RediShell, allows attackers to gain full access to the…

A Scalable Solution for Global Privileged Access Management
06
Oct
2025

A Scalable Solution for Global Privileged Access Management

Paris, France, October 6th, 2025, CyberNewsWire Reemo continues its mission to secure enterprise remote access and becomes the first French…

Timeliner - Windows Forensic Tool for DFIR Investigators
06
Oct
2025

Timeliner – Windows Forensic Tool for DFIR Investigators

Forensic-Timeliner, a Windows forensic tool for DFIR investigators, has released version 2.2, which offers enhanced automation and improved artifact support…

Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools
06
Oct
2025

Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools

A threat actor has claimed responsibility for a significant data breach at Huawei Technologies, a multinational technology corporation based in…

Doctors Imaging Group Suffers Data Breach
06
Oct
2025

Doctors Imaging Group Suffers Data Breach

Doctors Imaging Group, a healthcare provider based in Florida, has reported a significant data breach that exposed the sensitive personal…

NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks
06
Oct
2025

NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks

NCSC has issued an urgent warning regarding a critical zero-day flaw in Oracle E-Business Suite (EBS) that is currently being…

How Windows Command-line Utility PsExec.exe Can Be Abused To Execute Malicious Code
06
Oct
2025

How Windows Command-line Utility PsExec.exe Can Be Abused To Execute Malicious Code

PsExec represents one of the most contradictory tools in the cybersecurity landscape, a legitimate system administration utility that has become…