Category: CyberSecurityNews

Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets
03
Nov
2025

Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets

Proton has launched a new initiative called the Data Breach Observatory. This program reveals serious problems that exist on the…

03
Nov
2025

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure

Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one…

New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic
03
Nov
2025

New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic

A sophisticated campaign targeting military personnel across Russia and Belarus has emerged, deploying a complex multi-stage infection chain that establishes…

Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
03
Nov
2025

Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code

Multiple vulnerabilities in Microsoft’s Graphics Device Interface (GDI), a core component of the Windows operating system responsible for rendering graphics….

New BOF Tool Exploits Microsoft Teams' Cookie Encryption allowing Attackers to Access User Chats
03
Nov
2025

New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats

A specialized Beacon Object File (BOF) designed to extract authentication cookies from Microsoft Teams without disrupting the application. This development…

03
Nov
2025

New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats

A specialized Beacon Object File (BOF) designed to extract authentication cookies from Microsoft Teams without disrupting the application. This development…

New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
02
Nov
2025

New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

An upgraded release of tool EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR) systems by exploiting Windows bind…

02
Nov
2025

New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

An upgraded release of tool EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR) systems by exploiting Windows bind…

OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
02
Nov
2025

OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically

OpenAI has unveiled Aardvark, an autonomous AI agent powered by its cutting-edge GPT-5 model, designed to detect software vulnerabilities and…

How Malicious AI Hijacks Victim Agents
01
Nov
2025

How Malicious AI Hijacks Victim Agents

Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems. The…

Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
01
Nov
2025

Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Cybercriminals and state-sponsored actors are ramping up attacks on unpatched Cisco IOS XE devices across Australia, deploying a persistent Lua-based…

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
01
Nov
2025

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

The notorious Akira ransomware group announced on October 29, 2025, that it successfully breached the systems of Apache OpenOffice, exfiltrating…