Category: CyberSecurityNews

New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems
11
Nov
2025

New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems

VanHelsing has emerged as a sophisticated ransomware-as-a-service operation that fundamentally changes the threat landscape for organizations worldwide. First observed on…

Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
11
Nov
2025

Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub

A sophisticated remote data-wipe attack targeting Android devices has emerged, exploiting Google’s Find Hub service to execute destructive operations on…

Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code
11
Nov
2025

Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code

Synology has released an urgent security update addressing a critical remote code execution vulnerability in BeeStation OS that allows unauthenticated…

Zoom Workplace for Windows Vulnerability Allow Users to Escalate Privilege
11
Nov
2025

Zoom Workplace for Windows Vulnerability Allow Users to Escalate Privilege

A security vulnerability has been discovered in Zoom Workplace VDI Client for Windows that could allow attackers to gain elevated…

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access
11
Nov
2025

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

A critical vulnerability in WatchGuard Firebox firewalls could allow attackers to gain complete administrative access to the devices without any…

65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub
11
Nov
2025

65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub

A new security investigation reveals that 65% of prominent AI companies have leaked verified secrets on GitHub, exposing API keys,…

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
11
Nov
2025

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Email-based threats have reached a critical inflection point in the third quarter of 2025. Threat actors are systematically exploiting weaknesses…

Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data
11
Nov
2025

Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data

Zoom has issued multiple security bulletins detailing patches for several vulnerabilities affecting its Workplace applications. The disclosures, published today, highlight…

Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature
11
Nov
2025

Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Google Mandiant has disclosed active exploitation of CVE-2025-12480, a critical unauthenticated access vulnerability in Gladinet’s Triofox file-sharing platform. The threat cluster…

SAP Security Update - Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks
11
Nov
2025

SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks

SAP released its monthly Security Patch Day updates, addressing 18 new security notes and providing two updates to existing ones,…

CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks
11
Nov
2025

CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks

CISA has added a critical zero-day vulnerability affecting Samsung mobile devices to its Known Exploited Vulnerabilities catalog. Warning that threat…

Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware
11
Nov
2025

Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware

A sophisticated wave of ransomware attacks targeting UK organizations has emerged in 2025, exploiting vulnerabilities in the widely-used SimpleHelp Remote…