Category: CyberSecurityNews

New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data
05
Oct
2025

New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data

A newly disclosed vulnerability, named the WireTap attack, allows attackers with physical access to break the security of Intel’s Software…

New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click
04
Oct
2025

New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click

A groundbreaking cybersecurity vulnerability has emerged that transforms Perplexity’s AI-powered Comet browser into an unintentional collaborator for data theft.  Security…

Discord Data Breach - Customers Personal Data and Scanned Photo IDs leaked
04
Oct
2025

Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked

A data breach at a third-party customer service provider has exposed the personal data of some Discord users, including names,…

Renault UK Suffers Cyberattack - Hackers Stolen Users Customers Personal Data
03
Oct
2025

Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data

Renault UK has notified customers of a data breach after a cyberattack on one of its third-party service providers resulted…

Scattered LAPSUS$ Hunters Announce Salesforce Breach List On New Onion Site
03
Oct
2025

Scattered LAPSUS$ Hunters Announce Salesforce Breach List On New Onion Site

A cybercrime collective known as Scattered LAPSUS$ Hunters has launched a new data leak site on the dark web, claiming…

Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads
03
Oct
2025

Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads

Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated exploitation effort. …

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies
03
Oct
2025

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

An operator known as GhostSocks advertised a novel Malware-as-a-Service (MaaS) on the Russian cybercrime forum XSS.is on October 15, 2023,…

New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems
03
Oct
2025

New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems

AmCache plays a vital role in identifying malicious activities in Windows systems. This tool allows the identification of both benign…

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
03
Oct
2025

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In recent months, a sophisticated campaign dubbed Cavalry Werewolf has emerged, targeting government and critical infrastructure organizations across Russia and…

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps
03
Oct
2025

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps

In recent months, security teams have observed a surge in Android spyware campaigns that prey on privacy-conscious users by masquerading…

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program
03
Oct
2025

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program

The resurgence of XWorm in mid-2025 marks a significant escalation in malware sophistication. After a lull following the abrupt discontinuation…

Chinese Hackers Compromising High-Value IIS Servers to Manipulate Search Rankings
03
Oct
2025

Chinese Hackers Compromising High-Value IIS Servers to Manipulate Search Rankings

The Chinese-speaking cybercrime group UAT-8099 has been stealthily breaching valuable Internet Information Services (IIS) servers in India, Thailand, Vietnam, Canada,…