Category: CyberSecurityNews

Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
07
Nov
2025

Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus

A sophisticated banking trojan named Herodotus has emerged as a significant threat to Android users worldwide. Operating as Malware-as-a-Service, this…

Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
07
Nov
2025

Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain

Active Directory sites are designed to optimize network performance across geographically separated organizations by managing replication and authentication across multiple…

Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks
07
Nov
2025

Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks

Microsoft’s upcoming Teams update, set for targeted releases in early November 2025 and worldwide by January 2026, will allow users…

New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
07
Nov
2025

New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model

LockBit 5.0 made its debut in late September 2025, marking a significant upgrade for one of the most notorious ransomware-as-a-service…

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs
07
Nov
2025

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Russian-based threat actors are distributing a sophisticated Android Remote Access Trojan through underground channels, offering it as a subscription service…

Researchers Evaded Elastic EDR's Call Stack Signatures by Exploiting Call Gadgets
07
Nov
2025

Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets

Security researchers have successfully evaded Elastic EDR’s call stack signature detection by exploiting a technique involving “call gadgets” to bypass…

15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware
07
Nov
2025

15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware

A sophisticated supply-chain attack has emerged targeting Windows systems through compromised npm packages, marking a critical vulnerability in open-source software…

New Phising Attack Targeting Travellers from Hotel’s Compromised Booking.com Account
07
Nov
2025

New Phising Attack Targeting Travellers from Hotel’s Compromised Booking.com Account

A sophisticated phishing campaign is actively targeting hotel establishments and their guests through compromised Booking.com accounts, according to research uncovered…

Chinese Hackers Organization Influence U.S. Government Policy on International Issues
07
Nov
2025

Chinese Hackers Organization Influence U.S. Government Policy on International Issues

China-linked threat actors have intensified their focus on influencing American governmental decision-making processes by targeting organizations involved in shaping international…

LeakyInjector and LeakyStealer malwares Attacks Users to Steal Crypto’s and Browser History
07
Nov
2025

LeakyInjector and LeakyStealer malwares Attacks Users to Steal Crypto’s and Browser History

A dangerous two-stage malware threat, LeakyInjector and LeakyStealer, that targets cryptocurrency wallets and personal browser information explicitly. The malware duo…

Cavalry Werewolf Attacking Government Organizations to Deploy Backdoor For Network Access
07
Nov
2025

Cavalry Werewolf Attacking Government Organizations to Deploy Backdoor For Network Access

In July 2025, a sophisticated hacker group known as Cavalry Werewolf executed a targeted campaign against Russian government institutions, compromising…

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token
07
Nov
2025

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token

Amazon has disclosed a significant security vulnerability in its WorkSpaces client for Linux that could allow unauthorized users to extract…