Category: CyberSecurityNews

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
01
Oct
2025

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely

The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote…

Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions
01
Oct
2025

Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions

A concerning cybersecurity trend has emerged as threat actors exploit the growing popularity of artificial intelligence tools by distributing malicious…

Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework
30
Sep
2025

Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework

A sophisticated attack campaign targeting improperly managed Microsoft SQL servers has emerged, deploying the XiebroC2 command and control framework to…

CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks
30
Sep
2025

CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks

In late September 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued a public alert regarding the active exploitation of…

APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials
30
Sep
2025

APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials

In recent months, a surge in targeted intrusions attributed to the Iranian-aligned threat group APT35 has set off alarm bells…

How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds
30
Sep
2025

How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds

Security Operations Centers (SOCs) protect organizations’ digital assets from ongoing cyber threats. To assess their effectiveness, SOCs use key performance…

Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web
30
Sep
2025

Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Veeam Backup & Replication, a cornerstone of many enterprises’ data protection strategy, has reportedly become the focus of a new…

Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location
30
Sep
2025

Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location

Three new vulnerabilities in Google’s Gemini AI assistant suite could have allowed attackers to exfiltrate users’ saved information and location…

CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks
30
Sep
2025

CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks

CISA has issued an urgent advisory regarding a critical vulnerability in the Linux and Unix sudo utility CVE-2025-32463 that is…

Linux 6.17 Released With Fix for use-after-free Vulnerabilities
30
Sep
2025

Linux 6.17 Released With Fix for use-after-free Vulnerabilities

Linux Torvalds has announced the release of Linux Kernel 6.17, a new version focused on stability and incremental improvements rather…

Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability
30
Sep
2025

Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability

Security researchers are observing a significant increase in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability (CVE-2024-3400).  Exploit attempts have…

Tesla's Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root
30
Sep
2025

Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root

A security vulnerability in Tesla’s Telematics Control Unit (TCU) allowed attackers with physical access to bypass security measures and gain…